exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 325 discussion

Actual exam question from CompTIA's PT0-002
Question #: 325
Topic #: 1
[All PT0-002 Questions]

A penetration tester issues the following command after obtaining a shell:



Which of the following describes this technique?

  • A. Establishing a backdoor
  • B. Privilege escalation
  • C. PowerShell remoting
  • D. Living-off-the-land
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kinny4000
2 months, 2 weeks ago
Selected Answer: D
The technique described is LOLBin, Living-off-the-land binary. If the pentester was just executing the fgdump.exe then yes it would be privilege escalation, but all they are doing is downloading the file in this command.
upvoted 2 times
...
Jay39
9 months ago
Selected Answer: D
This command is using certutil to download a file (in this case, fgdump.exe) from a specified URL to the local machine. certutil is a built-in Windows utility, often used for certificate management, but it can also be used to download files. This technique leverages legitimate system utilities to perform potentially malicious activities, making it harder for traditional security defenses to detect. Therefore, the technique being described is: D. Living-off-the-land This term refers to the use of legitimate software and functions already available in the operating system to carry out malicious actions.
upvoted 1 times
...
FasterN8
9 months, 1 week ago
Selected Answer: B
certutil is native, but fgdump is not. This is trying to crack passwords to get more privileges.
upvoted 1 times
...
MalikMak
1 year ago
Selected Answer: D
Living-off-the-land (LotL) techniques involve the use of native tools available on the system to conduct operations typically performed by attackers. This can include moving laterally through a network, executing files, or exfiltrating data, all while potentially evading detection.
upvoted 1 times
...
Obiwan123
1 year, 1 month ago
Selected Answer: D
Yeti87 is wrong
upvoted 3 times
...
yeti87
1 year, 1 month ago
Selected Answer: B
This command downloads the fgdump.exe tool from the specified URL and saves it locally as fgdump.exe. fgdump.exe is a popular tool used for privilege escalation on Windows systems. It is often used to dump password hashes from the SAM (Security Accounts Manager) database, which can then be cracked offline to obtain plaintext passwords. Therefore, this technique is associated with privilege escalation as it aims to obtain sensitive information (password hashes) that could potentially lead to escalated privileges within the system.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago