During an engagement, a penetration tester wants to enumerate users from Linux systems by using finger and rwho commands. However, the tester realizes these commands alone will not achieve the desired result. Which of the following is the best tool to use for this task?
A. Nikto
B. Burp Suite
C. smbclient
D. theHarvester
Explanation
The correct answer is D. theHarvester because it is specifically designed for the early stages of penetration testing to gather open-source intelligence (OSINT), with a core function being the enumeration of emails, subdomains, hosts, and employee names (usernames) from public sources.
Why the Harvester is best:
The finger and rwho commands are legacy services that, if running on a target server, could provide user information directly. However, the question states these commands "alone will not achieve the desired result," implying the services are not available or are blocked. In this scenario, the tester must pivot to passive reconnaissance methods. theHarvester collects data from dozens of public sources like search engines (Google, Bing), PGP key servers, LinkedIn, and Shodan. This allows the tester to discover potential usernames (e.g., jsmith@company.com) without sending any packets directly to the target infrastructure.
Reference to Exam Objective:
This falls under the "Information Gathering and Vulnerability Scanning" domain. A key skill is knowing when to use active scanning (directly interacting with the target) versus passive reconnaissance (using open sources) to gather information like valid usernames.
Analysis of Incorrect Options
A. Nikto:
Nikto is a web server scanner. It is excellent for finding known vulnerabilities, misconfigurations, and dangerous files on web servers. It does not have a primary function for enumerating system users or gathering OSINT data like employee names.
B. Burp Suite:
Burp Suite is a web application proxy used for intercepting, manipulating, and analyzing HTTP/S traffic. It is used for active testing of web applications, not for passively enumerating user information from public sources.
C. smbclient:
smbclient is a tool for interacting with Windows SMB/CIFS file shares, similar to an FTP client. It is used for enumerating shares, users, and groups on Windows systems (specifically those with SMB enabled). The question is about enumerating users from Linux systems, making this tool generally unsuitable for the task.
In summary, when direct methods like finger and rwho fail, theHarvester is the best tool for passively enumerating potential usernames associated with a target organization from open-source intelligence.
A penetration tester needs to help create a threat model of a custom application. Which of the following is the most likely framework the tester will use?
A. MITRE ATT&;CK
B. OSSTMM
C. CI/CD
D. DREAD
Explanation
The correct answer is D. DREAD because it is a classic and practical threat-modeling framework specifically designed for categorizing and prioritizing risks associated with software applications.
What is DREAD? DREAD is an acronym that stands for five key questions used to calculate a risk score for a potential threat:
Damage Potential: How great is the damage if the vulnerability is exploited?
Reproducibility: How easy is it to reproduce the attack?
Exploitability: How easy is it to launch an attack?
Affected Users: How many users are affected?
Discoverability: How easy is it to find the vulnerability?
Application to Custom Applications:
When threat modeling a custom application, the goal is to identify potential threats (e.g., "an attacker could perform SQL injection on the login form") and then systematically evaluate the risk they pose to the business. DREAD provides a simple, quantitative method to do this, making it ideal for application-focused threat modeling.
Reference to Exam Objective:
This falls under the "Planning and Scoping" domain, where understanding risk assessment and threat modeling frameworks is essential for scoping an engagement and focusing efforts on the highest-risk areas.
Analysis of Incorrect Options
A. MITRE ATT&CK:
This is a comprehensive knowledge base of adversary tactics and techniques based on real-world observations. While incredibly valuable for understanding how advanced persistent threats (APTs) operate and for mapping findings to a common framework, it is broader in scope. It is more focused on enterprise-level security postures and detecting/posturing against specific adversary behaviors than on the specific, granular threat modeling of a single custom application's code and design.
B. OSSTMM (Open Source Security Testing Methodology Manual):
This is a methodology for security testing, not specifically for threat modeling. It provides a framework for conducting operational security tests (like penetration tests) by defining rules of engagement, channels to test, and metrics. It tells you how to test, but it is not a framework for systematically identifying and ranking threats before testing begins.
C. CI/CD (Continuous Integration/Continuous Deployment):
This is a software development practice, not a threat-modeling framework. It involves automating the steps of building, testing, and deploying code. While integrating security (e.g., SAST, DAST) into a CI/CD pipeline is a best practice (DevSecOps), the pipeline itself is not a framework for analyzing threats.
In summary, while MITRE ATT&CK is a powerful framework, DREAD is the most directly applicable and commonly used framework for the specific task of modeling threats against a custom application's features and components.
A penetration tester wants to check the security awareness of specific workers in the company with targeted attacks. Which of the following attacks should the penetration tester perform?
A. Phishing
B. Tailgating
C. Whaling
D. Spear phishing
Explanation
The correct answer is D. Spear phishing because it is defined as a highly targeted phishing attack directed at specific individuals or groups within an organization.
How it works:
Spear phishing emails are carefully crafted to appear legitimate to the targeted employees. They often use the target's name, position, work phone number, and other information gathered from sources like LinkedIn or the company website to build trust. The goal is to trick that specific person into clicking a malicious link, opening a malicious attachment, or revealing credentials.
Why it's correct for this scenario:
The question explicitly states the tester wants to target "specific workers." Spear phishing is the perfect social engineering attack for this purpose, as it tests whether those particular individuals can identify a sophisticated, personalized malicious email.
Reference to Exam Objective:
This falls under the "Attacks and Exploits" domain, specifically social engineering attacks. A penetration tester must know the differences between various phishing techniques.
Analysis of Incorrect Options
A. Phishing:
This is a broad-term for sending fraudulent emails to a large number of recipients indiscriminately. While it tests general awareness, it is not "targeted." A typical phishing campaign might be sent to every employee in the company (e.g., "Your password is expiring, click here"). It does not meet the requirement of testing "specific workers."
B. Tailgating:
This is a physical security attack, not a digital one. It involves an unauthorized person following an authorized person into a restricted area. While it tests employee awareness of physical security policies, it does not align with the context of a targeted attack against "specific workers" in the way the question is framed, which implies a technical/email-based attack.
C. Whaling:
This is a type of spear phishing that targets high-profile individuals like CEOs, CFOs, or other executives ("big fish"). While it is targeted, it is a subset of spear phishing. The term "specific workers" is more general and could refer to any employee, not necessarily the "whales" or top executives. Spear phishing is the broader and more accurate term for any targeted phishing against specific individuals, regardless of their rank.
In summary, Spear phishing is the most precise term for a targeted email-based social engineering attack against specific employees, making it the best choice for testing their security awareness.
A penetration tester needs to identify all vulnerable input fields on a customer website. Which of the following tools would be best suited to complete this request?
A. DAST
B. SAST
C. IAST
D. SCA
Explanation
The correct answer is A. DAST (Dynamic Application Security Testing) because it is designed to find vulnerabilities by interacting with a running application from the outside, just like an attacker would. This makes it ideal for testing input fields.
How it works:
A DAST tool (e.g., OWASP ZAP, Burp Suite Scanner) automatically crawls the website to discover all pages, forms, and input fields. It then performs attacks against these inputs, sending various payloads to test for vulnerabilities like SQL Injection, Cross-Site Scripting (XSS), Command Injection, and others. It analyzes the application's responses to determine if the attack was successful.
Why it's best for this task:
The goal is to find vulnerable input fields on a live, deployed website. DAST operates against this running instance without needing access to the source code, perfectly matching the scenario.
Reference to Exam Objective:
This falls under the "Information Gathering and Vulnerability Scanning" domain. Understanding the different types of application security testing tools and when to use them is a key competency.
Analysis of Incorrect Options
B. SAST (Static Application Security Testing):
SAST tools (e.g., SonarQube, Checkmarx) analyze an application's source code, bytecode, or binary code for potential vulnerabilities without running the program. While excellent for finding code-level flaws early in the development lifecycle, it would not be used by a penetration tester against a customer's deployed website, as they typically would not have access to the source code.
C. IAST (Interactive Application Security Testing):
IAST tools combine elements of SAST and DAST. They run inside the application (e.g., via an agent) while it is being tested (e.g., by a DAST tool or manual tester) and analyze the code behavior in real-time. While powerful, IAST requires instrumentation of the application, which is typically a development-level activity. A third-party penetration tester is unlikely to have the ability to install IAST agents on a customer's production or staging website.
D. SCA (Software Composition Analysis):
SCA tools (e.g., Snyk, Black Duck) are used to scan an application's dependencies (libraries, frameworks) to identify known vulnerabilities in those third-party components. For example, it would flag if the website uses a version of the jQuery library with a known security flaw. It does not scan the website's custom input fields for vulnerabilities like SQL Injection or XSS.
In summary, DAST is the correct category of tool for a penetration tester to use when the task is to find vulnerabilities in the user-facing components (like input fields) of a live web application.
A penetration tester is compiling the final report for a recently completed engagement. A junior QA team member wants to know where they can find details on the impact, overall security findings, and high-level statements. Which of the following sections of the report would most likely contain this information?
A. Quality control
B. Methodology
C. Executive summary
D. Risk scoring
Explanation
The correct answer is C. Executive summary because it is specifically designed to provide a high-level overview of the engagement for audiences who need to understand the key takeaways without delving into technical details.
Content of the Executive Summary:
This section typically includes:
Overall Security Posture:
A high-level statement about the organization's security posture based on the test results (e.g., "The application demonstrated a robust security posture with minor vulnerabilities.").
Key Findings:
A summary of the most critical vulnerabilities discovered, often with a count (e.g., "The test revealed 2 Critical, 5 High, and 10 Medium risk vulnerabilities.").
Impact:
A discussion of the potential business impact if the identified vulnerabilities were to be exploited (e.g., "These findings could lead to a full compromise of customer data.").
Scope and Dates:
A brief mention of what was tested and when.
High-Level Recommendations:
A summary of the most important remediation actions.
This is precisely the information the junior QA team member is asking for: impact, overall findings, and high-level statements.
Reference to Exam Objective:
This falls under the "Reporting and Communication" domain. A critical skill is structuring a report appropriately for different audiences (e.g., executives vs. technical staff).
Analysis of Incorrect Options
A. Quality control:
This is not a standard section in a penetration test report. Quality control refers to the internal processes the testing team uses to ensure the accuracy and quality of their work. It is not a part of the delivered report's content.
B. Methodology:
This section describes the process used during the engagement. It details the tools, techniques, and standards (e.g., PTES, OWASP) followed. It explains how the test was conducted, not the results (findings and impact) of the test.
D. Risk scoring:
Risk scoring is a component used within the report, typically within the "Findings" section for each specific vulnerability. It quantifies the severity of a finding (e.g., using CVSS or a custom matrix). It does not provide an overall, high-level narrative of the impact and collective findings; it is a granular, technical detail applied to individual issues.
In summary, the Executive Summary is the dedicated section for providing a concise, high-level overview of the engagement's results, impact, and key findings, making it the correct answer.
A penetration tester is testing a power plant's network and needs to avoid disruption to the grid. Which of the following methods is most appropriate to identify vulnerabilities in the network?
A. Configure a network scanner engine and execute the scan.
B. Execute a testing framework to validate vulnerabilities on the devices.
C. Configure a port mirror and review the network traffic.
D. Run a network mapper tool to get an understanding of the devices.
Explanation
The correct answer is C because it represents the most passive and non-intrusive method of gathering information, which is critical when testing critical infrastructure like a power plant where any disruption could have severe consequences.
How it works:
A port mirror (also known as SPAN - Switched Port Analyzer) copies all network traffic from one or more switch ports to another port where a monitoring device is connected. The penetration tester can connect their analysis machine to this mirrored port and passively capture traffic using a tool like Wireshark or tcpdump.
Why it's most appropriate:
This method involves zero interaction with the target devices. The tester does not send any probes or packets that could potentially cause a malfunction in sensitive Industrial Control Systems (ICS) or Supervisory Control and Data Acquisition (SCADA) systems. By analyzing the traffic, the tester can identify:
Active hosts and their IP/MAC addresses.
Services and protocols in use.
Potential cleartext credentials.
Unusual network patterns that might indicate misconfigurations.
Reference to Exam Objective:
This falls under the "Planning and Scoping" and "Information Gathering" domains. It highlights the importance of selecting appropriate techniques based on the target environment's criticality and the rules of engagement, a key concept for the exam.
Analysis of Incorrect Options
A. Configure a network scanner engine and execute the scan. and D. Run a network mapper tool to get an understanding of the devices.
Why they are incorrect:
Both of these options involve active scanning. Tools like Nmap or Nessus send a large number of packets to discover hosts and probe for open ports and services. These packets can be misinterpreted by fragile ICS/SCADA devices as malicious attacks or malformed data, potentially causing them to crash, hang, or enter an error state. This could lead to the very disruption (power grid outage) the tester is mandated to avoid. They are too risky for this environment.
B. Execute a testing framework to validate vulnerabilities on the devices.
Why it's incorrect:
This is the most intrusive option. "Validating vulnerabilities" often involves exploit frameworks like Metasploit to attempt to exploit a suspected vulnerability. This carries an extremely high risk of disrupting the target system, especially if it is a critical control system with unknown stability. This step would only be considered after extensive passive and very careful active testing, and only with explicit permission for such intrusive actions, which is not implied here.
In summary, when the primary constraint is to avoid any disruption, passive traffic analysis via a port mirror is the safest and most appropriate initial method for identifying potential vulnerabilities and understanding the network landscape.
A penetration tester has just started a new engagement. The tester is using a framework that breaks the life cycle into 14 components. Which of the following frameworks is the tester using?
A. OWASP MASVS
B. OSSTMM
C. MITRE ATT&;CK
D. CREST
Explanation:
The OSSTMM (Open Source Security Testing Methodology Manual) is a comprehensive framework for security testing that includes 14 components in its life cycle. Here’s why option B is correct:
OSSTMM: This methodology breaks down the security testing process into 14 components, covering various aspects of security assessment, from planning to execution and reporting.
OWASP MASVS: This is a framework for mobile application security verification and does not have a 14-component life cycle.
MITRE ATT&CK: This is a knowledge base of adversary tactics and techniques but does not describe a 14-component life cycle.
CREST: This is a certification body for penetration testers and security professionals but does not provide a specific 14-component framework.
References from Pentest:
Anubis HTB: Emphasizes the structured approach of OSSTMM in conducting comprehensive security assessments.
Writeup HTB: Highlights the use of detailed methodologies like OSSTMM to cover all aspects of security testing.
Conclusion:
Option B, OSSTMM, is the framework that breaks the life cycle into 14 components, making it the correct answer.
During a vulnerability assessment, a penetration tester configures the scanner sensor and performs the initial vulnerability scanning under the client's internal network. The tester later discusses the results with the client, but the client does not accept the results. The client indicates the host and assets that were within scope are not included in the vulnerability scan results. Which of the following should the tester have done?
A. Rechecked the scanner configuration.
B. Performed a discovery scan.
C. Used a different scan engine.
D. Configured all the TCP ports on the scan.
Explanation:
When the client indicates that the scope's hosts and assets are not included in the vulnerability scan results, it suggests that the tester may have missed discovering all the devices in the scope. Here’s the best course of action:
Performing a Discovery Scan:
Purpose: A discovery scan identifies all active devices on the network before running a detailed vulnerability scan. It ensures that all in-scope devices are included in the assessment.
Process: The discovery scan uses techniques like ping sweeps, ARP scans, and port scans to identify active hosts and services.
Comparison with Other Actions:
Rechecking the Scanner Configuration (A): Useful but not as comprehensive as ensuring all hosts are discovered.
Using a Different Scan Engine (C): Not necessary if the issue is with host discovery rather than the scanner’s capability.
Configuring All TCP Ports on the Scan (D): Helps in detailed scanning but does not address missing hosts.
Performing a discovery scan ensures that all in-scope devices are identified and included in the vulnerability assessment, making it the best course of action.
During a penetration test, a tester captures information about an SPN account. Which of the following attacks requires this information as a prerequisite to proceed?
A. Golden Ticket
B. Kerberoasting
C. DCShadow
D. LSASS dumping
Explanation:
Kerberoasting is an attack technique that specifically requires Service Principal Name (SPN) accounts as a prerequisite. Here’s why:
In Active Directory, SPNs are used to associate a service instance with a service account.
Attackers (or penetration testers) can request service tickets for these SPNs. The tickets are encrypted with the service account’s password hash.
By capturing these tickets, the tester can attempt offline brute-force or dictionary attacks to recover the plaintext password of the service account.
This is valuable because service accounts often have elevated privileges, making them prime targets for lateral movement or privilege escalation.
Other options explained:
A. Golden Ticket
Requires access to the KRBTGT account hash, not SPN information.
C. DCShadow
Involves manipulating domain controller replication, unrelated to SPNs.
D. LSASS dumping
Extracts credentials from memory, not dependent on SPNs.
Thus, the attack that requires SPN account information is Kerberoasting.
Reference
CompTIA PenTest+ PT0-003 Exam Objectives: Domain 3.0 – Attacks and Exploits (covers Kerberoasting as a credential attack).
MITRE ATT&CK Technique T1558.003: Steal or Forge Kerberos Tickets – Kerberoasting.
While performing an internal assessment, a tester uses the following command: crackmapexec smb 192.168.1.0/24 -u user.txt -p Summer123@ Which of the following is the main purpose of the command?
A. To perform a pass-the-hash attack over multiple endpoints within the internal network
B. To perform common protocol scanning within the internal network
C. To perform password spraying on internal systems
D. To execute a command in multiple endpoints at the same time
Explanation:
This question asks for the main purpose of the given CrackMapExec command.
Understanding the command:
crackmapexec smb 192.168.1.0/24 -u user.txt -p Summer123@
Let’s break down each part:
crackmapexec : The tool being used
smb : The protocol to use (SMB)
192.168.1.0/24 : The target network range
-u user.txt : A file containing a list of usernames
-p Summer123@ : A single password to try
What this command does:
CrackMapExec will attempt to authenticate to every SMB server in the 192.168.1.0/24 network using every username from user.txt with the single password Summer123@.
This is the classic pattern of a password spraying attack:
One password
Many usernames
Many targets
Analysis of options:
A. To perform a pass-the-hash attack
Pass-the-hash uses password hashes (NTLM hashes), not plaintext passwords. The command uses a plaintext password (-p Summer123@), not a hash. Incorrect.
B. To perform common protocol scanning
While CrackMapExec does check if the SMB port is open, the primary purpose of this command is authentication testing, not just port scanning. Incorrect.
C. To perform password spraying on internal systems
This is exactly correct. Password spraying involves trying a single common password against many usernames across many systems to avoid account lockouts. Correct.
D. To execute a command in multiple endpoints
CrackMapExec can execute commands (using the -x parameter), but this command does not include any command to execute. It only attempts authentication. Incorrect.
Conclusion:
The command is attempting to authenticate using one password against multiple usernames across multiple hosts, which is the definition of password spraying.
Correct Answer:
C. To perform password spraying on internal systems
| Page 4 out of 28 Pages |