ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 212 - PT0-002 discussion

Report
Export

A penetration tester opened a shell on a laptop at a client's office but is unable to pivot because of restrictive ACLs on the wireless subnet. The tester is also aware that all laptop users have a hardwired connection available at their desks. Which of the following is the BEST method available to pivot and gain additional access to the network?

A.
Set up a captive portal with embedded malicious code.
Answers
A.
Set up a captive portal with embedded malicious code.
B.
Capture handshakes from wireless clients to crack.
Answers
B.
Capture handshakes from wireless clients to crack.
C.
Span deauthentication packets to the wireless clients.
Answers
C.
Span deauthentication packets to the wireless clients.
D.
Set up another access point and perform an evil twin attack.
Answers
D.
Set up another access point and perform an evil twin attack.
Suggested answer: C

Explanation:

The best method available to pivot and gain additional access to the network is to span deauthentication packets to the wireless clients. This will cause them to disconnect from their wireless access point and reconnect using their hard-wired connection, which may have less restrictive ACLs. The penetration tester can then capture their traffic or attempt to compromise their systems.

asked 02/10/2024
Francisco Julian Mota Fraile
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first