ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 332 - CAS-004 discussion

Report
Export

A security researcher detonated some malware in a lab environment and identified the following commands running from the EDR tool:

With which of the following MITRE ATT&CK TTPs is the command associated? (Select TWO).

A.
Indirect command execution
Answers
A.
Indirect command execution
B.
OS credential dumping
Answers
B.
OS credential dumping
C.
Inhibit system recovery
Answers
C.
Inhibit system recovery
D.
External remote services
Answers
D.
External remote services
E.
System information discovery
Answers
E.
System information discovery
F.
Network denial of service
Answers
F.
Network denial of service
Suggested answer: B, E

Explanation:

OS credential dumping is the process of obtaining account login and password information, normally in the form of a hash or a clear text password, from the operating system and software. System information discovery is the process of gathering information about the system, such as hostname, IP address, OS version, running processes, etc. Both of these techniques are commonly used by adversaries to gain access to sensitive data and resources on the target system. The command shown in the image is using Mimikatz, a tool that can dump credentials from memory, and also querying the system information using WMIC. Verified

Reference:

https://attack.mitre.org/techniques/T1003/

https://attack.mitre.org/techniques/T1082/

https://github.com/gentilkiwi/mimikatz

https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmic

asked 02/10/2024
Barry Higgins
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first