ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 93 - PT0-003 discussion

Report
Export

During an assessment, a penetration tester obtains a low-privilege shell and then runs the following command:

findstr /SIM /C:'pass' *.txt *.cfg *.xml

Which of the following is the penetration tester trying to enumerate?

A.
Configuration files
Answers
A.
Configuration files
B.
Permissions
Answers
B.
Permissions
C.
Virtual hosts
Answers
C.
Virtual hosts
D.
Secrets
Answers
D.
Secrets
Suggested answer: D

Explanation:

By running the command findstr /SIM /C:'pass' *.txt *.cfg *.xml, the penetration tester is trying to enumerate secrets.

Command Analysis:

findstr: A command-line utility in Windows used to search for specific strings in files.

/SIM: Combination of options; /S searches for matching files in the current directory and all subdirectories, /I specifies a case-insensitive search, and /M prints only the filenames with matching content.

/C:'pass': Searches for the literal string 'pass'.

***.txt .cfg .xml: Specifies the file types to search within.

Objective:

The command is searching for the string 'pass' within .txt, .cfg, and .xml files, which is indicative of searching for passwords or other sensitive information (secrets).

These file types commonly contain configuration details, credentials, and other sensitive data that might include passwords or secrets.

Other Options:

Configuration files: While .cfg and .xml files can be configuration files, the specific search for 'pass' indicates looking for secrets like passwords.

Permissions: This command does not check or enumerate file permissions.

Virtual hosts: This command is not related to enumerating virtual hosts.

Pentest

Reference:

Post-Exploitation: Enumerating sensitive information like passwords is a common post-exploitation activity after gaining initial access.

Credential Discovery: Searching for stored credentials within configuration files and documents to escalate privileges or move laterally within the network.

By running this command, the penetration tester aims to find stored passwords or other secrets that could help in further exploitation of the target system.

asked 02/10/2024
Maurice Nicholson
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first