ExamGecko
Question list
Search
Search

Related questions











Question 562 - 312-50v12 discussion

Report
Export

A penetration tester is performing an enumeration on a client's network. The tester has acquired permission to perform enumeration activities. They have identified a remote inter-process communication (IPC) share and are trying to collect more information about it. The tester decides to use a common enumeration technique to collect the desired data. Which of the following techniques would be most appropriate for this scenario?

A.
Brute force Active Directory
Answers
A.
Brute force Active Directory
B.
Probe the IPC share by attempting to brute force admin credentials
Answers
B.
Probe the IPC share by attempting to brute force admin credentials
C.
Extract usernames using email IDs
Answers
C.
Extract usernames using email IDs
D.
Conduct a DNS zone transfer
Answers
D.
Conduct a DNS zone transfer
Suggested answer: B

Explanation:

Probing the IPC share by attempting to brute force admin credentials is the most appropriate technique for this scenario, because it can reveal valuable information about the target system, such as its operating system, services, users, groups, and shares. An IPC share is a special share that allows processes to communicate with each other over the network using named pipes. An IPC share can be accessed anonymously or with valid credentials, depending on the security configuration of the target system. A brute force attack is a method of trying different combinations of usernames and passwords until a valid pair is found. By using a brute force attack, the tester can try to access the IPC share with admin credentials, which can grant them more privileges and access to more resources on the target system.

The other options are less suitable or effective techniques for this scenario. Brute forcing Active Directory may not be relevant or feasible, as the target system may not be part of a domain or may have strong password policies. Extracting usernames using email IDs may not provide enough information or access to the target system, as email IDs may not match the usernames or passwords. Conducting a DNS zone transfer may not be possible or useful, as the target system may not be a DNS server or may have restricted zone transfers. A DNS zone transfer is a method of obtaining information about the domain names and IP addresses of the hosts in a network by querying a DNS server.Reference:

Inter-process communication - Wikipedia

IPC$ share and null session behavior - Windows Server

Brute Force Attack: Definition, Examples, and Prevention

DNS Zone Transfer: Definition, Types, and Examples

asked 18/09/2024
Joe Mon
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first