ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 391 - PT0-002 discussion

Report
Export

A penetration tester captures SMB network traffic and discovers that users are mistyping the name of a fileshare server. This causes the workstations to send out requests attempting to resolve the fileshare server's name. Which of the following is the best way for a penetration tester to exploit this situation?

A.
Relay the traffic to the real file server and steal documents as they pass through.
Answers
A.
Relay the traffic to the real file server and steal documents as they pass through.
B.
Host a malicious file to compromise the workstation.
Answers
B.
Host a malicious file to compromise the workstation.
C.
Reply to the broadcasts with a fake IP address to deny access to the real file server.
Answers
C.
Reply to the broadcasts with a fake IP address to deny access to the real file server.
D.
Respond to the requests with the tester's IP address and steal authentication credentials.
Answers
D.
Respond to the requests with the tester's IP address and steal authentication credentials.
Suggested answer: D

Explanation:

In the scenario where users are mistyping the name of a fileshare server, leading to broadcast requests, the most effective exploitation strategy would be for the penetration tester to respond to these requests with their own IP address (D) and set up a service to capture authentication credentials. This technique is known as a 'Man-in-the-Middle' (MitM) attack, where the attacker intercepts communication between two parties. In this case, the tester can exploit the misdirected requests to potentially capture sensitive information such as usernames and passwords.

asked 02/10/2024
Robert Akehurst
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first