ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 264 - PT0-002 discussion

Report
Export

A penetration tester has extracted password hashes from the lsass.exe memory process. Which of the following should the tester perform NEXT to pass the hash and provide persistence with the newly acquired credentials?

A.
Use Patator to pass the hash and Responder for persistence.
Answers
A.
Use Patator to pass the hash and Responder for persistence.
B.
Use Hashcat to pass the hash and Empire for persistence.
Answers
B.
Use Hashcat to pass the hash and Empire for persistence.
C.
Use a bind shell to pass the hash and WMI for persistence.
Answers
C.
Use a bind shell to pass the hash and WMI for persistence.
D.
Use Mimikatz to pass the hash and PsExec for persistence.
Answers
D.
Use Mimikatz to pass the hash and PsExec for persistence.
Suggested answer: D

Explanation:

Mimikatz is a credential hacking tool that can be used to extract logon passwords from the LSASS process and pass them to other systems. Once the tester has the hashes, they can then use PsExec, a command-line utility from Sysinternals, to pass the hash to the remote system and authenticate with the new credentials. This provides the tester with persistence on the system, allowing them to access it even after a reboot.

"A penetration tester who has extracted password hashes from the lsass.exe memory process can use various tools to pass the hash and gain access to other systems using the same credentials. One tool commonly used for this purpose is Mimikatz, which can extract plaintext passwords from memory or provide a pass-the-hash capability. After gaining access to a system, the tester can use various tools for persistence, such as PsExec or WMI." (CompTIA PenTest+ Study Guide, p. 186)

asked 02/10/2024
Noor Amy
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first