CompTIA PenTest+ Practice Test Chapter 3 Attacks and Exploits (Sybex: Panek, Crystal, Tracy) Flashcards
You are conducting a black box penetration test for a client. You have used reconnaissance tools to create a list of employee email addresses within the target organization. You craft an email addressed to all of the employees warning them that they must change their password within 24 hours or they will lose access. When they click the link provided in the email, they are redirected to your own website where their credentials are captured to a text file. What kind of exploit did you use?
A.Phishing
B.Vishing
C.Smishing
D.Whaling
A.Phishing
Explanation:
A phishing attack was used in this scenario because the malicious email was sent indiscriminately to all the employees within the organization.
You are performing a gray box penetration test for a medium-sized organization. You have used reconnaissance techniques to identify a help desk employee and a payroll employee. You craft an email to the payroll employee that appears to come from the help desk employee directing the payroll employee to reset her password. When she clicks the link provided in the email, she is redirected to your own website where her credentials are captured to a text file. What kind of exploit did you use?
A.Phishing
B.Interrogation
C.Spear phishing
D.Whaling
C.Spear phishing
Explanation:
A spear phishing attack was used in this scenario because the malicious email was specifically crafted for a specific employee. A generic phishing attack, on the other hand, would have been sent indiscriminately to a large group of employees within the organization.
You are performing a black box penetration test for a medium-sized organization. You have used reconnaissance techniques to identify the CEO’s email address as well as the email address belonging to a help desk employee. You craft an email to the CEO that appears to come from the help desk employee directing the CEO to reset her password. When she clicks the link provided in the email, she is redirected to your own website where her credentials are captured to a text file. What kind of exploit did you use?
A.Smishing
B.Vishing
C.Spear phishing
D.Whaling
D.Whaling
Explanation:
A whaling attack is essentially a form of spear phishing attack that is aimed specifically at C-suite employees, such as the CEO, CFO, COO, CIO, and so on. A standard spear phishing attack, on the other hand, would have been sent to a lower-level employee within the organization.
You are performing a black box penetration test for a medium-sized organization that sells imported clothing. You have used reconnaissance techniques to identify a key software developer. You send this employee a personalized text message containing a Bitly URL that points to your own website where you capture information to a text file. What kind of exploit did you use in this scenario?
A.Phishing
B.Smishing
C.Vishing
D.Whaling
B.Smishing
Explanation:
A SMS phishing attack (also called a smishing attack) was used in this scenario. A smishing attack leverages text messaging instead of email to conduct a phishing exploit.
You are performing a black box penetration test for a small organization that wholesales imported electronic devices in the United States. You have used reconnaissance techniques to identify a receptionist’s phone number as well as the organization’s printer vendor. You call this receptionist, pretending to be a sales rep from the vendor. You ask the receptionist for information about their printers, workstations, operating systems, and so on, to learn more about the organization’s network infrastructure. What kind of exploit did you use in this scenario?
A.Smishing
B.Vishing
C.Spear phishing
D.Whaling
B.Vishing
Explanation:
A voice phishing attack (also called a vishing attack) was used in this scenario. A vishing attack leverages a telephone call instead of email to conduct a phishing exploit. Essentially, the attacker calls a particular employee pretending to be someone else in order to get information.
Which social engineering technique involves questioning an employee using intimidation to gather information?
A.Phishing
B.Smishing
C.Impersonation
D.Interrogation
D.Interrogation
Explanation:
Interrogation involves questioning an employee of the target organization, using fear as a motivation to gather information. Interrogation is not a technique that is typically used by penetration testers.
You are performing a black box penetration test for a large financial organization. Using reconnaissance techniques, you have identified the vendor that services the vending machines within the organization’s main headquarters. You dress in a similar uniform as the vendor’s employees. You also purchase a hand truck and several cases of soda pop. The receptionist of the target organization allows you to enter and directs you to the break room. What kind of exploit did you use in this scenario?
A.Impersonation
B.Smishing
C.Vishing
D.Elicitation
A.Impersonation
Explanation:
Impersonation is a social engineering technique that can be used by a penetration tester to gain physical access to the target’s facility. In this scenario, the receptionist allowed the tester to access the organization’s facility because the tester appears to be from a trusted vendor.
You are performing a black box penetration test for a medium-sized manufacturing organization. Using reconnaissance techniques, you have identified the vendor that services the printers within the organization’s headquarters. You dress in a similar uniform as that vendor’s employees. You also purchase a toolkit containing tools commonly used by printer repair technicians. The receptionist of the target organization allows you to enter and directs you to a troublesome printer. While “working” on that printer, you chat with nearby employees to gather information. Which exploits did you use in this scenario? (Choose two.)
A.Impersonation B.Whaling C.Phishing D.Interrogation E.Elicitation
A.Impersonation
E.Elicitation
Explanation:
Impersonation is a social engineering technique that can be used by a penetration tester to gain physical access to the target’s facility. In this scenario, the receptionist allowed the tester to access the organization’s facility because the tester appears to be from a trusted vendor. The tester also used elicitation techniques to gather sensitive information from employees.
You are performing a black box penetration test for a medium-sized manufacturing organization. Using reconnaissance techniques, you have identified the vendor that services the printers within the organization’s headquarters. You dress in a similar uniform as that vendor’s employees. You also purchase a toolkit containing tools commonly used by printer repair technicians. The receptionist of the target organization allows you to enter and directs you to a troublesome printer. While “working” within the organization, you discretely watch employees as they type, trying to gather sensitive information. Which exploits did you use in this scenario? (Choose two.)
A. Shoulder surfing B.Phishing C.Impersonation D.Interrogation E.Elicitation
A. Shoulder surfing
C.Impersonation
Explanation:
Impersonation is a social engineering technique that can be used by a penetration tester to gain physical access to the target’s facility. In this scenario, the receptionist allowed the tester to access the organization’s facility because the tester appears to be from a trusted vendor. The tester also used shoulder-surfing techniques to gather sensitive information from employees.
You are performing a black box penetration test for a medium-sized manufacturing organization. Using reconnaissance and phishing techniques, you have compromised the password for an employee’s email account. You use this account to question other employees in an attempt to gather sensitive information and documents. Which exploits did you use in this scenario? (Choose two.) A.Shoulder surfing B.Phishing C.Impersonation D.Interrogation D.Elicitation
C.Impersonation
E.Elicitation
Explanation:
Impersonation is a social engineering technique that can be used by a penetration tester to gain the trust of the target organization’s employees. In this scenario, the employees trusted the tester because emails appeared to be coming from another employee. The tester leveraged this trust to elicit sensitive information from those employees. This is sometimes called business email compromise.
You have been hired to conduct a black box penetration test for a client. You purchase a small flash drive and load it with malware that installs a keylogger on the victim’s computer and sends the information it captures to you. You walk in the client’s front door and ask the receptionist for directions to a nearby sports venue. While you are speaking, you deliberately drop the drive on the floor and then leave. Which exploit was used in this scenario?
A.Shoulder surfing
B.USB key drop
C.Phishing
D.Elicitation
B.USB key drop
Explanation:
In a USB key drop exploit, some type of malware is usually loaded on a flash drive. That drive is then deliberately left somewhere that an employee of the target organization will likely find it. The goal is for the employee to plug it in to see what it contains. When this happens, the malware is automatically loaded on the victim’s computer.
Which exploit sends emails indiscriminately to a large number of the target organization’s employees, anticipating that a percentage of them will click the malicious link contained in the message?
A.Phishing
B.Spear phishing
C.SMS phishing
D.Whaling
A.Phishing
Explanation:
In a standard phishing exploit, email messages are sent indiscriminately to a large number of individuals, hoping that a percentage of them will click the malicious link contained in the message.
Which exploit relies on text messaging to deliver phishing messages?
A.Elicitation
B.Spear phishing
C.SMS phishing
D.Whaling
C.SMS phishing
Explanation
A SMS phishing attack (also called a smishing attack) leverages text messaging instead of email to conduct a phishing exploit.
Which exploit relies on a telephone call to convince someone to reveal sensitive information?
A.Vishing
B.Spear phishing
C.Phishing
D.Whaling
A.Vishing
Explanation:
A voice phishing attack (also called a vishing attack) leverages a telephone call instead of email to conduct a phishing exploit. Essentially, the attacker calls a particular employee pretending to be someone else in order to get information.
Which exploits require the penetration tester to first conduct extensive reconnaissance to identify specific, high-value individuals to target within the organization? (Choose two.)
A.Spear phishing B.Phishing C.USB key drop D.Whaling E.SMS phishing
A.Spear phishing
D.Whaling
Explanation:
Both spear phishing and whaling require the penetration tester to conduct extensive research to identify high-value target individuals within the organization.
Which social engineering technique is least likely to be used during a penetration test?
A.Interrogation
B.Impersonation
C.Shoulder surfing
D.USB key drop
A.Interrogation
Explanation:
Interrogation involves questioning an employee of the target organization, using fear as a motivation to gather information. Interrogation is not a technique that is typically used by penetration testers because it would likely result in criminal charges against the tester as well as civil litigation.
You have been hired to conduct a black box penetration test for a client. You purchase a small flash drive and load it with malware that sends information to you. Using reconnaissance techniques, you have identified the vendor that services the heating and air conditioning within the organization’s headquarters. You dress in a similar uniform as that vendor’s employees and purchase the tools they commonly use. The receptionist of the target organization allows you to enter and directs you to the mechanical room. You deliberately leave the flash drive on a user’s chair as you walk by an open cubicle. Which exploits were used in this scenario? (Choose two.)
A.Elicitation B.Impersonation C.Shoulder surfing D.USB key drop E.Business email compromise
B.Impersonation
D.USB key drop
Explanation:
Impersonation is a social engineering technique that can be used by a penetration tester to gain physical access to the target’s facility. In this scenario, the receptionist allowed the tester to access the organization’s facility because the tester appears to be from a trusted vendor. The tester also used a USB key drop exploit, hoping that the user would insert the flash drive into their computer and install the malware it contains.
You have been hired to conduct a black box penetration test for a client. You walk into the organization’s main entrance and ask the receptionist for information about current job openings. You watch the keystrokes she types on her computer in hopes of capturing sensitive information that you can use to gain access to the internal network. What kind of exploit was used in this scenario?
A.Spear phishing B.Impersonation C.Shoulder surfing D.USB key drop E.Business email compromise
C.Shoulder surfing
Explanation:
The penetration tester used shoulder surfing techniques in this scenario. In shoulder surfing, the tester observes information that employees type or display on their computers in an attempt to gather sensitive information. For example, the tester may use shoulder surfing to gather usernames, passwords, email addresses, phone numbers, file server share names, and so on.
You have been hired to conduct a gray box penetration test for a client. You managed to walk by just as she was logging on to her email account and watch the keystrokes she typed on her computer. Later that evening, after the employee has gone home for the day, you log on to her email account and send requests for information to other employees. Which exploits were used in this scenario? (Choose two.)
A.Spear phishing B.Whaling C.USB key drop D.Shoulder surfing E.Business email compromise
D.Shoulder surfing
E.Business email compromise
Explanation:
The penetration tester used shoulder surfing and business email compromise techniques in this scenario. In shoulder surfing, the tester observes information that employees type or display on their computers in an attempt to gather sensitive information. In this example, the tester used shoulder surfing to gather the employee’s email username and passwords. The tester then used the compromised account to gather information from other employees. This is called business email compromise.
You are performing reconnaissance as a part of a black box penetration test. You notice that the employees of the target organization commonly congregate at a particular outdoor restaurant for lunch. You begin frequenting the same restaurant for lunch and make friends with several of the target organization’s employees. After you gain their trust, they begin to share information about their jobs, computers, bosses, customers, projects, and so on. What type of exploit occurred in this scenario?
A.Whaling
B.Elicitation
C.Interrogation
D.Phishing
B.Elicitation
Explanation:
This is an example of elicitation. By gaining the employees’ trust, the tester was able to elicit sensitive information from them about their employer.
A penetration tester sends a spear phishing email to an employee of the target organization, claiming to be the director of operations. The email asks the employee to reply with sensitive internal information. What motivation factor did the penetration tester use in this scenario?
A.Authority
B.Scarcity
C.Social proof
D.Likeness
A.Authority
Explanation:
By masquerading as an upper-level manager, the penetration tester in this example utilized an appeal to authority to coerce the employee into divulging sensitive information.
A penetration tester sends a spear phishing email to an employee of the target organization, claiming to be an agent with the Federal Bureau of Investigations (FBI). The email indicates that the employee’s manager is being investigated for embezzlement and asks the employee to reply with sensitive internal information. What motivation factor did the penetration tester use in this scenario?
A.Likeness
B.Scarcity
C.Social proof
D.Authority
D.Authority
Explanation:
By masquerading as an FBI agent, the penetration tester in this example utilized authority (and possibly fear) as a motivation factor to coerce the employee into divulging sensitive information.
A penetration tester sends a spear phishing email to an employee of the target organization, claiming to be a fellow employee who has forgotten her password. The email indicates she has a presentation in a few minutes and can’t access her presentation files on a shared network drive. She asks the employee to “loan” her his username and password so she can log on and get the files. What motivation factor did the penetration tester use in this scenario?
A.Fear
B.Urgency
C.Authority
D.Scarcity
B.Urgency
Explanation:
By masquerading as a fellow employee in great distress in this scenario, the penetration tester is using urgency to motivate the employee to give up his username and password. She may also be using likeability as a factor.
A penetration tester sends a phishing email to the employees of the target organization. The link in the email leads to a fake website that lists more than 1,000 reviews with an average rating of 4.9 stars. What motivation factor did the penetration tester use in this scenario?
A.Social proof
B.Urgency
C.Scarcity
D.Authority
A.Social proof
Explanation:
The penetration tester is using social proof as a motivating factor. Because it appears that more than 1,000 people have had a positive experience with the website, most of the employees will probably trust the site, even if it asks them to divulge sensitive information.
A penetration tester sends a phishing email to the employees of the target organization. The email purports to be offering iPads for an absurdly low price. However, there are only 25 left at this price. The link in the email leads to a fake website that uses a drive-by-download script that drops a keylogger on the employee’s computer. What motivation factor did the penetration tester use in this scenario?
A.Fear
B.Social proof
C.Authority
D.Scarcity
D.Scarcity
Explanation:
The penetration tester is using scarcity as a motivating factor. By asserting that there are only a small number of devices available at the steeply discounted price, the employees are motivated to make a purchase before supplies run out.
You are performing reconnaissance as a part of a black box penetration test. You notice that the employees of the target organization commonly congregate at a particular outdoor restaurant for lunch. You hire several young, physically attractive consultants to help with the penetration test. You send them to the same restaurant for lunch and have them make friends with several of the target organization’s employees. They gain the employees’ trust, and the employees begin to share information about their jobs, computers, bosses, customers, projects, and so on. Which motivation factor was used in this scenario?
A.Authority
B.Scarcity
C.Social proof
D.Likeness
D.Likeness
Explanation:
The penetration tester is using likeness as a motivating factor. By hiring young, friendly, and physically attractive assistants, the penetration tester is able to coerce employees of the target organization into revealing sensitive information about their employer.
During a penetration test, you send an email to the CFO of the target organization. The email claims that the webcam on the CFO’s laptop has been clandestinely used to record him viewing pornography. The email threatens to post this video and notify his family, his employer, and the police if he doesn’t respond with certain sensitive information about his company. Which motivation factor was used in this scenario?
A.Fear
B.Social proof
C.Authority
D.Scarcity
A.Fear
Explanation:
The penetration tester is using fear as a motivating factor. Whether the claim is true or not, the CFO knows that such a revelation could damage his family and career. It could also expose him to prosecution. This could potentially motivate him to divulge sensitive information.
A penetration tester sends an email to a sales rep of the target organization, claiming to be the CEO of one of the organization’s most important clients. The email asks the employee to create a VPN account to allow the CEO access to certain files on the organization’s network. The email threatens to terminate the business relationship if this doesn’t happen. What motivation factor did the penetration tester use in this scenario?
A.Likeness
B.Social proof
C.Authority
D.Scarcity
C.Authority
Explanation:
The penetration tester is using authority (and probably urgency along with fear) as a motivating factor. The sales rep may be inclined to create the VPN connection to prevent the supposed loss of an important client.
A penetration tester sends an email to an employee of the target organization, claiming to be a sales rep on the road. She claims in the email that her VPN connection from her hotel is running extremely slow and that she can’t access her client’s data. If she doesn’t get the data, she will lose the sale. The message asks the employee to email her a copy of the files. What motivation factor did the penetration tester use in this scenario?
A.Social proof
B.Urgency
C.Scarcity
D.Authority
B.Urgency
Explanation:
The penetration tester is using urgency (and possibly likeness) as a motivating factor. The employee will probably comply with the request out of a desire to be seen as a “team player.” This type of attack can be made even more effective by conducting reconnaissance beforehand and identifying the names of real sales reps working for the organization.
A penetration tester sends email to an employee of the target organization, claiming to be a sales rep on the road. She claims in the email that she forgot her VPN password and now it is locked because she tried too many wrong ones. She asks the employee for his VPN username and password so she can log on and update the customer database with a huge new order. She mentions in the email that one of the target employee’s coworkers has done this for her in the past and it wasn’t a big deal. What motivation factors did the penetration tester use in this scenario? (Choose two.)
A.Social proof B.Urgency C.Scarcity D.Authority E.Fear
A.Social proof
B.Urgency
Explanation:
The penetration tester is using two motivation factors in this example. She is using urgency and social proof as motivating factors. Because it is a huge order, the employee probably feels a sense of urgency to comply. The penetration tester also employs social proof by mentioning the name of a familiar co-worker. This probably helps the employee feel more comfortable with giving the penetration tester his username and password.
Which motivation factor gets people to act quickly due to a sense of limited supply?
A.Social proof
B.Likeness
C.Scarcity
D.Authority
C.Scarcity
Explanation:
People can be motivated to act quickly when they believe something they want is in limited supply. This is called scarcity. They don’t want to miss out on an opportunity, product, deal, or service that will soon become unavailable.
Which motivation factor gets people to act because they believe that “everyone else is doing it”?
A.Social proof
B.Fear
C.Scarcity
D.Authority
A.Social proof
Explanation:
People can be motivated to act if they think that everyone else is doing the same thing. This is called social proof. The (flawed) assumption is that if everyone else is doing something, it must be the right thing to do.
Which motivation factor gets people to act because someone with clout wants them to?
A.Likeness
B.Social proof
C.Authority
D.Scarcity
C.Authority
Explanation:
People are naturally motivated by a respect for authority. When they believe someone in authority wants them to do something, they will frequently comply, especially if the request is coupled with a sense of urgency.
Which motivation factor gets people to act quickly because they believe someone needs help?
A.Social proof
B.Urgency
C.Scarcity
D.Authority
B.Urgency
Explanation:
Many people are naturally motivated to help others in distress. This is called urgency. When they believe someone needs help, they may bend or break the rules to help the person out.
Which motivation factor gets people to act because they want to please the person making a request of them?
A.Likeness
B.Social proof
C.Authority
D.Scarcity
A.Likeness
Explanation:
Most people will help someone they perceive to be a friend. This is called likeness. When someone they believe to be a friend needs help, they may bend or break the rules to help the person out.
Which motivation factor gets people to act because they worry about the consequences of not acting?
A.Social proof
B.Fear
C.Scarcity
D.Authority
B.Fear
Explanation:
Most people will respond to a request to act if they are made to fear the consequences of failing to act. This is one of the most basic human motivations.
THIS IS DEBATABLE, PIGGYBACKING IS WHEN THE REAL EMPLOYEE IS AWARE THEY ARE LETTING YOU IN, TAILGAITING WOULD BE SLIPPING IN WITHOUT THE REAL EMPLOYEES KNOWLEDGE AKA SLIPPING IN THE CLOSING DOOR
A penetration tester enters the target organization’s physical facility by walking behind an employee and grabbing the authentication-protected door before it shuts all of the way. What is this technique called?
A.Piggybacking
B.Tailgating
C.Lock bypass
D.Badge cloning
A.Piggybacking
Explanation:
Piggybacking occurs when an intruder tags along with an authorized person through a physical barrier, such as a locking door or a turnstile. This happens without the authorized person’s knowledge or consent.
A penetration tester enters the target organization’s physical facility by striking up a conversation with an employee in the parking lot and walking with her through a door that uses a proximity badge reader to control access. The employee uses her badge to open the door and holds it open for the penetration tester. What is this technique called?
A.Piggybacking
B.Tailgating
C.Lock bypass
D.Badge cloning
A.Piggybacking
Explanation:
.Piggybacking occurs when an intruder tags along with an authorized person through a physical barrier, such as a locking door or a turnstile. This happens with the authorized person’s knowledge and/or consent.
A penetration tester waits in the target organization’s parking lot until she sees a large group of employees returning from lunch. She inserts herself quietly at the back of the group. The first person in the group uses his badge to unlock a secured door. The penetration tester is able to move through the door with the rest of the group. What is this technique called?
A.Piggybacking
B.Tailgating
C.Lock bypass
D.Badge cloning
B.Tailgating
Explanation:
Piggybacking occurs when an intruder tags along with one or more authorized people through a physical barrier, such as a locking door or a turnstile. This happens without the authorized person’s knowledge or consent.
As a penetration tester approaches the main entrance to the target organization’s physical facility, she notices that a turnstile is used to control access. She carefully steps over the turnstile instead of walking through it. What is this technique called?
A.Piggybacking
B.Tailgating
C.Lock bypass
D.Fence jumping
D.Fence jumping
Explanation:
Fence jumping occurs when an unauthorized person simply jumps over a physical barrier designed to control access. In this scenario, the penetration tester simply steps over the turnstile that is designed to prevent unauthorized people from entering.
A penetration tester rifles through the target organization’s garbage and finds an optical disc. He reads the disc on his laptop and finds that it contains several very sensitive files from human resources. What kind of exploit occurred in this scenario?
A.Dumpster diving
B.Tailgating
C.Fence jumping
D.Egress sensor bypass
A.Dumpster diving
Explanation:
Dumpster diving occurs when an attacker searches through the target organization’s garbage looking for sensitive information.
A penetration tester impersonates a vending machine repair person to gain physical access to the target organization’s facility. Once inside, he notices that the door to the server room uses a simple pushbutton door lock that doesn’t use any kind of electronic authentication. Which physical security attack could he use to gain access to the server room?
A.Lock picking
B.Tailgating
C.Fence jumping
D.Egress sensor bypass
A.Lock picking
Explanation:
Because the server room is protected by a relatively unsophisticated locking mechanism, the penetration tester could pick the lock to gain access, assuming he has the necessary lock-picking skills. Note that this would have to be done in an area without surveillance or foot traffic as it may take some time to complete.
A penetration tester impersonates a heating and cooling repair person to gain physical access to the target organization’s facility. Once inside, she requests access to the server room to investigate a problem with the cold air return. As she is leaving the server room, she surreptitiously places a piece of strong tape over the door locking tab, allowing her to return into the room later without authorization. What is this technique called?
A.Lock picking
B.Lock bypass
C.Fence jumping
D.Badge cloning
B.Lock bypass
Explanation:
Lock bypass occurs when an attacker prevents a door’s locking mechanism from working. For example, this could be done by placing tape over the locking tab, as was done in this scenario.
The exterior double glass door to a facility has a motion sensor installed that automatically unlocks the door when someone is leaving the facility. To gain unauthorized access to the facility, a penetration tester sprays a can of air duster in the center crack between the doors to trigger the motion sensor and unlock the door. What is this technique called?
A.Lock picking
B.Tailgating
C.Fence jumping
D.Egress sensor bypass
D.Egress sensor bypass
Explanation:
Egress sensor bypass occurs when an attacker manipulates an egress sensor to unlock a door. In this scenario, the moving compressed air from the air duster is much colder and denser than the surrounding air, causing the egress sensor to think someone is exiting the building and unlock the door.
While waiting in line at a food truck behind an employee of the target organization, a penetration tester steals her access badge and makes a copy of its RFID signature on a fake access badge. What is this technique called?
A.Egress sensor bypass
B.Lock bypass
C.Badge cloning
D.Fence jumping
C.Badge cloning
Explanation:
Badge cloning occurs when an attacker makes a copy of a valid access badge in order to enter a facility. By copying a valid badge’s RFID signature, the penetration tester in this scenario can use the fake badge to access the target organization’s facility using the authorized employee’s credentials.
A penetration tester waits in the target organization’s parking lot early in the morning until she sees an employee heading toward the front door. She walks up behind the employee while clumsily carrying several large boxes. She asks the employee to hold the door for her and is able to enter the facility. What is this technique called?
A.Piggybacking
B.Tailgating
C.Lock bypass
D.Badge cloning
A.Piggybacking
Explanation:
Tailgating occurs when an intruder tags along with an authorized person through a physical barrier, such as a locking door or a turnstile. This occurs with the authorized person’s knowledge and/or consent. In this example, the authorized employee held the door open for the penetration tester.
A penetration tester observes that many employees of the target organization congregate outside the back door of the facility at 10 a.m. and 2 p.m. to smoke cigarettes. The next day, the tester joins the group and pretends to smoke with them. When the group finishes smoking, the tester walks through the back door behind the group. What is this technique called?
A.Piggybacking
B.Tailgating
C.Lock bypass
D.Badge cloning
A.Piggybacking
Explanation:
Piggybacking occurs when an intruder tags along with one or more an authorized people through a physical barrier, such as a locking door or a turnstile. This happens without the authorized person’s knowledge or consent.
A target organization’s facility is surrounded by a tall chain-link fence topped with barbed wire. A penetration tester observes that a remote section of the fence is overgrown with shrubbery.
Late at night, she uses bolt cutters to cut a slit in the fence that she can slip through at a later time. What is this technique called?
A.Egress sensor bypass
B.Lock bypass
C.Badge cloning
D.Fence jumping
D.Fence jumping
Explanation:
Fence jumping occurs when an unauthorized person simply jumps over or cuts through a physical barrier designed to control access. In this scenario, the tester penetrated the physical fence barrier by cutting a hole in it.
A penetration tester observes that the target organization’s garbage is picked up early in the morning every Tuesday. Late Monday night, she climbs into the organization’s garbage receptacle and gathers discarded documents, optical discs, and storage devices such as flash drives. What kind of exploit occurred in this scenario?
A.Dumpster diving
B.Tailgating
C.Fence jumping
D.Egress sensor bypass
A.Dumpster diving
Explanation:
Dumpster diving occurs when an attacker searches through the target organization’s garbage looking for sensitive information.
What tools are required, at a minimum, to pick a lock? (Choose two.)
A.A diagram of the inner locking mechanism
B.A can of spray lubricant
C.A tension wrench
D.A lock pick tool
C.A tension wrench
D.A lock pick tool
Explanation:
At a minimum, you need a tension wrench and a lock pick tool to pick a lock. The tension wrench is used to apply rotational pressure to the lock (in the unlock direction). The lock pick tool is used to release each of the pins within the lock.
A penetration tester impersonates a heating and cooling repair person to gain physical access to the target organization’s facility. Once inside, she requests access to the server room to investigate a problem with the cold air return. As she is leaving the server room, she surreptitiously places a small wooden wedge into the door jam, preventing the door from closing completely. This allows her to return into the room later without authorization. What is this technique called?
A.Lock picking
B.Lock bypass
C.Fence jumping
D.Badge cloning
B.Lock bypass
Explanation:
Lock bypass occurs when an attacker prevents a door’s locking mechanism from working. In this example, this was done by placing a wooden wedge in the door jamb, preventing the door from closing completely and preventing the locking mechanism from engaging.
Which of the following features of an egress sensor can be manipulated to allow a penetration tester to enter a building without authorization?
A.Emergency fail open
B.Automatic locking
C.Automatic unlocking via motion sensor for egress D.Automatic unlocking via light sensor for egress
A.Emergency fail open
Explanation:
Most automatically locking door systems have some type of emergency fail open mechanism. The idea behind this is that if there is an emergency of some sort, such as a fire, then the doors must automatically unlock to prevent people from being trapped inside or preventing emergency personnel from entering. If you can figure out what fail open mechanism is used, you may be able to manually trigger it to open a locked door.
A penetration tester rummages through the target organization’s garbage and finds a discarded access badge. She replicates a new badge with her picture using the discarded badge as a model. She uses a device to read the discarded badge’s magnetic stripe and replicate it on the fake badge. Which techniques were used by the tester in this scenario? (Choose two.)
A.Lock picking B.Dumpster diving C.Fence jumping D.Badge cloning E.Lock bypass
B.Dumpster diving
D.Badge cloning
Explanation:
In this scenario, dumpster diving was used to find the discarded access badge. Then badge cloning was used to create a fake badge.
Using reconnaissance, a penetration tester learns that the target organization’s employees use RFID access badges to unlock doors within the facility. Using the company’s website, he identifies high-level employees within the organization. Then he waits in the parking lot until he sees one of these individuals heading toward the front doors. He walks behind them into the reception area with a small RFID reader hidden in his coat. He captures the RFID signature from the individual’s badge and then creates his own fake access badge and encodes it with that RFID signature. What is this technique called?
A.Piggybacking
B.Tailgating
C.Lock bypass
D.Badge cloning
D.Badge cloning
Explanation:
Badge cloning occurs when an attacker makes a copy of a valid access badge to enter a facility. By copying a valid badge’s RFID signature, the penetration tester in this scenario can use the fake badge to access the target organization’s facility using the authorized employee’s credentials. Because he carefully selected a high-level employee’s badge for cloning, he may be able to access more sensitive areas of the facility.
A penetration tester is performing a gray box test for a client. During a network scan, she notices a host that has TCP port 139 open. She suspects this is a Windows system, so she runs the NBTSTAT command and discovers key information about the host. Which protocol on the remote host allowed the tester to gather this information?
A.NetBIOS
B.SNMP
C.NAC
D.SMTP
A.NetBIOS
Explanation:
NetBIOS is a transport protocol used by Windows systems to share resources, such as shared folders or printers. Once an attacker identifies that port 139 is open on a device, NBTSTAT can be used to footprint the device. For example, you could discover the device’s computer name and identify whether it is a workstation or a server. All of this information can be gathered without any kind of authentication.
During the information gathering phase of a gray box penetration test, you run the NBTSTAT -c command on the local network. One of the lines in the output reads as follows:
Name Type Host Address Life [sec] ———————————————————— DEV-1 <20> UNIQUE 10.0.0.3 517
What do you know about the DEV-1 host?
A.It is a server.
B.It is a workstation.
C.It is a router.
D.It is a wireless device.
A.It is a server.
Explanation:
NBTSTAT identifies NetBIOS servers with an ID of <20>. Based on this output, you know that DEV-1 is most likely a Windows server (or a Linux server running the Samba service).
During the information gathering phase of a gray box penetration test, you run the NBTSTAT -c command on the local network. One of the lines in the output reads as follows:
Name Type Host Address Life [sec] ———————————————————— PROD-9 <00> UNIQUE 10.0.0.132 517 What do you know about the PROD-9 host?
A.It is a server.
B.It is a workstation.
C.It is a router.
D.It is a wireless device.
B.It is a workstation.
Explanation:
NBTSTAT identifies NetBIOS workstations with an ID of <00>. Based on this output, you know that PROD-9 is most likely a Windows workstation (or a Linux workstation running the Samba service).
Which of the following are true of the Link-Local Multicast Name Resolution (LLMNR) protocol? (Choose two.)
A.It is commonly used in the absence of a DNS server.
B.It is not supported by Linux hosts.
C.It is not supported by Windows hosts.
D.It is used only by routers, not by workstations or servers.
E.It allows the IPv6 host to resolve hostnames on the same local link.
A.It is commonly used in the absence of a DNS server.
E.It allows the IPv6 host to resolve hostnames on the same local link.
Explanation:
The LLMNR protocol is loosely based on the DNS packet format and allows IPv4 and IPv6 hosts to perform name resolution for other hosts on the same local network without a DNS server. It is supported by both Windows and Linux hosts.
Which of the following describe the security risks associated with using the LLMNR protocol? (Choose two.)
A.Data is transmitted as clear text.
B.It lacks security controls.
C.A malicious host can advertise itself as any host it wants to.
D.It can be used to facilitate a DDoS attack.
E.It creates excessive network traffic.
B.It lacks security controls.
C.A malicious host can advertise itself as any host it wants to.
Explanation:
The LLMNR protocol has many security vulnerabilities that can be exploited in a penetration test. For example, it lacks security controls such as authentication. Because of this, a malicious host on the network can advertise itself as any host it wants to.
What are the functions of the Server Message Block (SMB) protocol? (Choose two.)
A.To share files on the network
B.To transfer email messages between mail transfer agents (MTAs)
C.To share printers on the network
D.To map IP addresses to MAC addresses
E.To transfer email messages to a mail user agent (MUA)
A.To share files on the network
C.To share printers on the network
Explanation:
The Server Message Block (SMB) protocol is used to share files and printers between hosts on a network.
Which of the following exploits are facilitated by weaknesses in the SMB protocol? (Choose two.)
A.Distributed denial of service (DDoS) B.Fraggle C.Teardrop D.EternalBlue E.WannaCry
D.EternalBlue
E.WannaCry
Explanation:
The EternalBlue and WannaCry exploits are facilitated by weaknesses in the SMB protocol. The EternalBlue exploit takes advantage of the fact that SMBv1 mishandles exploit packets, allowing attackers to remotely execute malicious code on the system running the SMB protocol. WannaCry is a form of ransomware that uses EternalBlue to gain access to vulnerable systems and install itself.
Which ports are used by the SMB protocol? (Choose two.)
A.53 B.80 C.139 D.443 E.445
C.139
E.445
Explanation:
The SMB protocol uses TCP ports 139 and 445. A system with these two ports open is most likely a Windows host running SMB or a Linux host running Samba (which is an open source implementation of the SMB service).
Which of the following are vulnerabilities associated with the SNMPv1 protocol? (Choose two.)
A.The community string is valid for every SNMPv1 node.
B.The community string is transmitted as clear text.
C.The community string uses the weak RC2 cipher.
D.No authentication is required to communicate with an SNMPv1 host.
E.The Management Information Base (MIB) is stored in unencrypted format.
A.The community string is valid for every SNMPv1 node.
B.The community string is transmitted as clear text.
Explanation:
The SNMPv1 protocol is an older protocol that uses the concept of a community string instead of a password. The same community string is used to authenticate to every SNMPv1 host in the network. By convention, most SNMPv1 administrators set the community string to a value of public. Even if a unique community string were used, it was easy to discover because it was transmitted as clear text on the network.
Which port is used by the SNMP protocol?
A.UDP 161
B.TCP 23
C.TCP 389
D.UDP 88
A.UDP 161
Explanation:
The SNMP protocol runs on UDP port 161.
What is the function of the Simple Mail Transfer Protocol (SMTP)?
A.To share files on the network
B.To transfer email messages between mail transfer agents (MTAs)
C.To map IP addresses to MAC addresses
D.To transfer email messages to a mail user agent (MUA)
B.To transfer email messages between mail transfer agents (MTAs)
Explanation:
The SMTP protocol is used to transfer email messages between mail transfer agents (MTAs).
During a gray box penetration test, you discover an open SMTP service running on an older database server. You want to use this SMTP service to send phishing emails to users within the organization. What is this exploit called?
A.Distributed denial of service
B.SMTP relay
C.Fraggle
D.Teardrop
B.SMTP relay
Explanation:
Leveraging an open SMTP service to send unauthorized email messages is called SMTP relay. Most new systems have provisions in place to prevent this from happening, but many older server systems do not.
During a gray box penetration test, you discover an open SMTP service running on an older database server. You want to use this SMTP service to send whaling emails to the organization’s CEO and CFO. How can you do this remotely from your laptop?
A.Telnet to the SMTP server’s IP address on port 25 and create the messages.
B.Use physical security exploits to gain access to the server console where you can create the messages. C.Use impersonation to trick the server administrator into revealing its Remote Desktop password.
D.None of the above.
A.Telnet to the SMTP server’s IP address on port 25 and create the messages.
Explanation:
One way to leveraging an open SMTP service to send unauthorized email messages is to connect to the SMTP server’s IP address on port 25 using a Telnet client. Once the connection has been established, you can use the command-line interface to create and send the messages.
Which ports are used by an FTP server? (Choose two.)
A.20 B.21 C.22 D.23 D.25
A.20
B.21
Explanation:
By default, an FTP server uses two ports: 20 and 21. Port 20 is used to transfer data between the FTP server and the FTP client. Port 21 is used to send commands between the FTP client and the FTP server.
While performing a black box penetration test, you identify a significant amount of FTP data being transferred between an unknown internal host on the target network and hosts on the Internet on ports 20 and 21. How could you exploit this traffic to gain access to systems on the target network?
A.Conduct a distributed denial-of-service (DDoS) attack.
B.Conduct a land attack.
C.Capture the FTP traffic with a sniffer.
D.Use anonymous FTP access to upload a keylogger to the FTP server.
C.Capture the FTP traffic with a sniffer.
Explanation:
One of the key weaknesses with the FTP protocol is the fact that it transmits all data between the FTP server and the FTP client as clear text, including authentication credentials. By sniffing the FTP traffic, you may be able to capture FTP usernames and passwords. Some FTP server implementations leverage existing network user accounts and passwords to authenticate FTP connections. So, by capturing FTP authentication credentials, you could potentially be capturing internal network user accounts and passwords too.
You are conducting a gray box penetration test. You want to capture C-level executives’ authentication credentials. To accomplish this, you set up a fake internal web server that looks exactly like the web server used to manage employee time-off and reimbursement requests. You inject a fake DNS record into the organization’s DNS server that redirects traffic from the real server to your fake server. What is this exploit called?
A.DNS poisoning
B.ARP poisoning
C.Phishing
D.Whaling
A.DNS poisoning
Explanation:
This is an example of DNS poisoning. This exploit leverages the trust users have in a URL that appears to be valid. Because users enter a valid URL, they have no idea than an exploit is being conducted. However, the DNS server itself has been reconfigured to resolve the domain name in URL to the IP address of the malicious server.
Which of the following is a mechanism that can be used to defend against DNS poisoning attacks?
A.Implement DNSSEC.
B.Close port 53 in the DNS server’s host firewall.
C.Disable ICMP forwarding in your router configuration.
D.Use SSH for DNS queries.
A.Implement DNSSEC.
Explanation:
One way to defend against DNS poisoning is to implement DNSSEC. DNSSEC signs each DNS request with a digital signature to ensure authenticity. This makes it difficult to insert poisoned records.
A penetration tester is conducting a gray box penetration test. She crafts a Trojan horse exploit that flushes the DNS cache on the local workstation and replaces it with malicious name resolution entries that point to a fake web server. When clients within the organization try to resolve hostnames, the malicious entries from the local DNS cache are used. What is this exploit called?
A.DNS poisoning
B.ARP poisoning
C.DNS cache poisoning
D.Man-in-the-middle
C.DNS cache poisoning
Explanation:
This is an example of DNS cache poisoning. Instead of compromising a heavily protected DNS server, the penetration tester simply compromises the DNS cache on relatively less secure workstations. The net effect is the same. Malware is a common delivery vehicle for DNS cache poisoning exploits.
A penetration tester is conducting a gray box penetration test. She notices that one of the branch offices of the organization uses a caching-only DNS server to handle name resolution requests. She sends a bogus reply to a name resolution request from the caching-only DNS server, using a spoofed source address in the reply packets. The bogus name resolution records point users to a fake web server that is used to harvest authentication credentials. What is this exploit called?
A.DNS poisoning
B.ARP poisoning
C.DNS cache poisoning
D.Man-in-the-middle
C.DNS cache poisoning
Explanation:
This is also an example of DNS cache poisoning. Instead of poisoning the local DNS cache on workstations, the cache of the caching-only DNS server has been poisoned in this scenario. The poisoned records will remain in the cache until the TTL value is reached.
While performing a gray-box penetration test, the tester discovers that several Linux workstations in the network have not been joined to the organization’s Active Directory domain, even though they have the Samba service installed. To access shared folders on Windows servers, these workstations use NT LAN Manager (NTLM) connections. The tester captures hashed user credentials as they are passed between workstations and servers and then reuses them later to establish new authenticated sessions with the file servers. What is this exploit called?
A.ARP poisoning
B.Fraggle attack
C.NAC bypass
D.Pass the hash
D.Pass the hash
Explanation:
This is an example of a pass-the-hash exploit. In this exploit, the tester captures hashed NTLM user credentials and then reuses them to authenticate at a later point in time to a Windows system. Because NTLM authentication uses hashed credentials, the tester doesn’t need to know the victim’s actual username and password. The hashed credentials are sufficient to create a new authenticated session.
During a gray box penetration test, the tester sends a fake ARP broadcast message on the local network segment. As a result, her laptop’s MAC address is now mapped to the IP address of another valid computer on the segment.
What is this exploit called?
A.DNS cache poisoning
B.ARP spoofing
C.Pass the hash
D.Replay attack
B.ARP spoofing
Explanation:
This is an example of ARP spoofing. In this exploit, the tester sends a fake ARP broadcast on the network segment that maps the IP address of a legitimate network host to her MAC address. As a result, all traffic addressed to the legitimate host gets redirected to the tester’s system.
An ARP spoofing attack is categorized as which type of exploit?
A.Denial of service (DoS)
B.Man-in-the-middle
C.Distributed denial of service (DDoS)
D.VLAN hopping
B.Man-in-the-middle
Explanation:
An ARP spoofing attack is classified as a man-in-the-middle attack.
During a black box penetration test, the tester parks in the target organizations parking lot and captures wireless network signals emanating from the building with his laptop. By doing this, he is able to capture the handshake process used by an authorized wireless client as it connects to the network. He later resends this handshake on the wireless network, allowing his laptop to connect to the wireless network as that authorized client. What kind of exploit is this?
A.DNS cache poisoning
B.ARP spoofing
C.Pass the hash
D.Replay attack
D.Replay attack/
Explanation:
This is an example of a replay attack. The tester captures valid handshake data from the wireless network and they replays it later to authenticate his laptop to the wireless network.
A replay attack is commonly categorized as which type of exploit?
A.Denial of service (DoS)
B.NAC bypass
C.Distributed denial of service (DDoS)
D.Man-in-the-middle
D.Man-in-the-middle
Explanation:
A replay attack is also classified as a man-in-the-middle attack.
During a gray box penetration test, the tester is able to intercept packets being transmitted from a client to a server. The tester’s workstation poses as the server to the client. The tester is able to modify the data in the packets and then send it on to the server. The tester’s workstation poses as the client to the server. What kind of exploit is this?
A.Relay attack
B.DNS cache spoofing
C.Pass the hash
D.Replay attack
A.Relay attack
Explanation:
This is an example of a relay attack. The attacker sits in between two hosts communicating on the network, in this case a workstation and a server. To the server, the attacker poses as the workstation. To the workstation, the attacker poses as the server.
During a gray box penetration test, the tester is able to intercept packets being transmitted from a client to a server. The tester’s workstation poses as the server to the client. The tester views the data in the packets but does not modify it before forwarding the data on to the server. What kind of exploit is this?
A.Relay attack
B.DNS cache spoofing
C.Pass the hash
D.Replay attack
A.Relay attack
Explanation:
This is also an example of a relay attack. The attacker sits in between two hosts communicating on the network, in this case a workstation and a server. To the server, the attacker poses as the workstation. To the workstation, the attacker poses as the server. In a relay attack, the man-in-the-middle may or may not modify the data being transmitted between the two hosts.