ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 408 - PT0-002 discussion

Report
Export

A penetration tester managed to get control of an internal web server that is hosting the IT knowledge base. Which of the following attacks should the penetration tester attempt next?

A.
Vishing
Answers
A.
Vishing
B.
Watering hole
Answers
B.
Watering hole
C.
Whaling
Answers
C.
Whaling
D.
Spear phishing
Answers
D.
Spear phishing
Suggested answer: B

Explanation:

A watering hole attack involves compromising a website that is frequently visited by the target organization or group. By gaining control of the internal web server hosting the IT knowledge base, a penetration tester could modify the content or introduce malicious code that would be downloaded or executed by employees who visit the site. This type of attack is effective because it leverages a trusted resource within the organization to spread malware or capture sensitive information.

Other options like vishing, whaling, and spear phishing involve direct social engineering attacks targeting individuals, whereas a watering hole attack leverages a compromised website to target multiple users within the organization.

Explanation of watering hole attacks: OWASP Watering Hole

Examples from penetration testing engagements where web server compromises were used to conduct watering hole attacks.

asked 02/10/2024
Ghazi Khan
24 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first