ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 32 - PT0-003 discussion

Report
Export

A penetration tester needs to collect information over the network for further steps in an internal assessment. Which of the following would most likely accomplish this goal?

A.
ntlmrelayx.py -t 192.168.1.0/24 -1 1234
Answers
A.
ntlmrelayx.py -t 192.168.1.0/24 -1 1234
B.
nc -tulpn 1234 192.168.1.2
Answers
B.
nc -tulpn 1234 192.168.1.2
C.
responder.py -I eth0 -wP
Answers
C.
responder.py -I eth0 -wP
D.
crackmapexec smb 192.168.1.0/24
Answers
D.
crackmapexec smb 192.168.1.0/24
Suggested answer: C

Explanation:

To collect information over the network, especially during an internal assessment, tools that can capture and analyze network traffic are essential. Responder is specifically designed for this purpose, and it can capture NTLM hashes and other credentials by poisoning various network protocols. Here's a breakdown of the options:

Option A: ntlmrelayx.py -t 192.168.1.0/24 -1 1234

ntlmrelayx.py is used for relaying NTLM authentication but not for broad network information collection.

Option B: nc -tulpn 1234 192.168.1.2

Netcat (nc) is a network utility for reading from and writing to network connections using TCP or UDP but is not specifically designed for comprehensive information collection over a network.

Option C: responder.py -I eth0 -wP

Responder is a tool for LLMNR, NBT-NS, and MDNS poisoning. The -I eth0 option specifies the network interface, and -wP enables WPAD rogue server which is effective for capturing network credentials and other information.

Option D: crackmapexec smb 192.168.1.0/24

CrackMapExec is useful for SMB-related enumeration and attacks but not specifically for broad network information collection.

Reference from Pentest:

Anubis HTB: Highlights the use of Responder to capture network credentials and hashes during internal assessments.

Horizontall HTB: Demonstrates the effectiveness of Responder in capturing and analyzing network traffic for further exploitation.

asked 02/10/2024
Brian scott
28 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first