List of questions
Related questions
Question 391 - PT0-002 discussion
A penetration tester captures SMB network traffic and discovers that users are mistyping the name of a fileshare server. This causes the workstations to send out requests attempting to resolve the fileshare server's name. Which of the following is the best way for a penetration tester to exploit this situation?
A.
Relay the traffic to the real file server and steal documents as they pass through.
B.
Host a malicious file to compromise the workstation.
C.
Reply to the broadcasts with a fake IP address to deny access to the real file server.
D.
Respond to the requests with the tester's IP address and steal authentication credentials.
Your answer:
0 comments
Sorted by
Leave a comment first