ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 276 - PT0-002 discussion

Report
Export

After compromising a system, a penetration tester wants more information in order to decide what actions to take next. The tester runs the following commands:

Which of the following attacks is the penetration tester most likely trying to perform?

A.
Metadata service attack
Answers
A.
Metadata service attack
B.
Container escape techniques
Answers
B.
Container escape techniques
C.
Credential harvesting
Answers
C.
Credential harvesting
D.
Resource exhaustion
Answers
D.
Resource exhaustion
Suggested answer: A

Explanation:

The penetration tester is most likely trying to perform a metadata service attack, which is an attack that exploits a vulnerability in the metadata service of a cloud provider. The metadata service is a service that provides information about the cloud instance, such as its IP address, hostname, credentials, user data, or role permissions. The metadata service can be accessed from within the cloud instance by using a special IP address, such as 169.254.169.254 for AWS, Azure, and GCP. The commands that the penetration tester runs are curl commands, which are used to transfer data from or to a server. The curl commands are requesting data from the metadata service IP address with different paths, such as /latest/meta-data/iam/security-credentials/ and /latest/user-data/. These paths can reveal sensitive information about the cloud instance, such as its IAM role credentials or user data scripts. The penetration tester may use this information to escalate privileges, access other resources, or perform other actions on the cloud environment. The other options are not likely attacks that the penetration tester is trying to perform.

asked 02/10/2024
Anas Hairuddin
23 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first