ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 242 - SY0-701 discussion

Report
Export

An employee fell for a phishing scam, which allowed an attacker to gain access to a company PC. The attacker scraped the PC's memory to find other credentials. Without cracking these credentials, the attacker used them to move laterally through the corporate network. Which of the following describes this type of attack?

A.
Privilege escalation
Answers
A.
Privilege escalation
B.
Buffer overflow
Answers
B.
Buffer overflow
C.
SQL injection
Answers
C.
SQL injection
D.
Pass-the-hash
Answers
D.
Pass-the-hash
Suggested answer: D

Explanation:

The scenario describes an attacker who obtained credentials from a compromised system's memory and used them without cracking to move laterally within the network. This technique is known as a 'pass-the-hash' attack, where the attacker captures hashed credentials (e.g., NTLM hashes) and uses them to authenticate and gain access to other systems without needing to know the plaintext password. This is a common attack method in environments where weak security practices or outdated protocols are in use.

Reference =

CompTIA Security+ SY0-701 Course Content: The course discusses credential-based attacks like pass-the-hash, emphasizing their impact and the importance of protecting credential stores.

asked 02/10/2024
Carlo Hearne
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first