exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 81 discussion

Actual exam question from CompTIA's PT0-001
Question #: 81
Topic #: 1
[All PT0-001 Questions]

A penetration tester successfully exploits a DMZ server that appears to be listening on an outbound port. The penetration tester wishes to forward that traffic back to a device. Which of the following are the BEST tools to use for this purpose? (Choose two.)

  • A. Tcpdump
  • B. Nmap
  • C. Wireshark
  • D. SSH
  • E. Netcat
  • F. Cain and Abel
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kabwitte
Highly Voted 4 years, 9 months ago
I think I will go with D. SSH and E. Netcat. I may be overthinking this but, SSH has many features including local port forwarding. Therefore, I would use ssh to forward the traffic back to a device (my attacking machine). Now using netcat (nc -nlvp 1234) I would start my listener on my attacking machine to intercept and monitor all connections being made. Correct me if I'm wrong, but the question is stating that the pentester wishes to forward traffic and now capture traffic. Tcpdump(command-line) and Wireshark(GUI) does the same thing, nmap would say what ports are opened (the pentester already knows that info), Cain and Abel is a password recovery tool. SSH Features: https://www.techrepublic.com/article/how-to-use-local-and-remote-ssh-port-forwarding/
upvoted 16 times
...
mr_robot
Highly Voted 5 years ago
C and D - PenTest+ Practice Tests Book - SYBEX In this scenario, the best options are SSH and Wireshark. Secure Shell (SSH) provides secure encrypted connections between systems. SSH provides remote shell access via an encrypted connection. SSH is used for secure command-line access to systems, typically via TCP port 22, and is found on devices and systems of all types. Because SSH is so common, testing systems that provide an SSH service is a very attractive option for a penetration tester. Wireshark is a protocol analyzer that allows penetration testers to eavesdrop on and dissect network traffic. Wireshark also allows for capturing network traffic from wireless networks.
upvoted 6 times
deathfrom
5 years ago
I do not understand why wireshark would be useful here. The question is the tester wishes to forward traffic. Nothing about capturing. I would say the answer is correct. Nmap and SSH. Nmap because we need to identify the ports and SSH to forward to those ports.
upvoted 3 times
D1960
4 years, 11 months ago
How does ssh forward traffic without anything capturing the traffic?
upvoted 1 times
...
D1960
4 years, 11 months ago
You bring up a good point about finding the port. It seems like if the pentester knew the DMZ server was listening on a port, the pentester would know which port. But maybe not.
upvoted 1 times
mr_robot
4 years, 11 months ago
If it was just for capturing/forwarding traffic I would choose tcpdump and Wireshark even though you need an SSH connection for both to work: https://www.comparitech.com/net-admin/tcpdump-capture-wireshark/ From all sites I researched shows you need a mix of SSH to connect remotely, tcpdump to capture and forward traffic to Wireshark in order to be analyzed: https://s905060.gitbooks.io/site-reliability-engineer-handbook/howto_use_wireshark_over_ssh.html Anyway, I think I would stick with Wireshark and SSH.
upvoted 1 times
...
...
...
D1960
4 years, 12 months ago
The question wants traffic to be forwarded. I think you can do that with Tcpdump, just by using '>'.
upvoted 2 times
...
...
kloug
Most Recent 2 years, 2 months ago
D,E CORRECT
upvoted 1 times
...
miabe
2 years, 9 months ago
Selected Answer: AE
looks good to me
upvoted 1 times
...
Jetlife
3 years ago
Going with A& E.
upvoted 1 times
...
Cock
3 years, 2 months ago
It was on the exam
upvoted 1 times
...
MrRiver
3 years, 7 months ago
This Question is FUN ... Ist it like: wich two tool you can use first ... Or is it like wich two tool you can use to complete the complete task? let's exclude the obvious wrong one: B. Nmap -> scans for ports an services ... we allready have access F. Cain and able -> more like a mitm tool Now the Objective is to forward (copy) all Traffic (incoming and outgoing) not manipulating it. Do we know the Operating System (Linux/Windows?) -> no. So first thing is we need to capture the traffic untouched ... can be done by Wireshark and TCP Dump both can send captured traffic to a pipe. So are we done now ? But we need to send it to another host ... sending Data from a Pipe can either be done by ssh oder netcat. BUT you wanna redirect the Traffic "some" device, so to me that means raw traffic. This would rule out SSH. So is boils down to 3 options: Wirshark&tcpdump netcat&wirehark netcat&tcpdump ON Linux you would go for tcpump & ncat ... but if it's a Windows OS thers no tcpdump just wireshark ... so ... well flip a 3 sided coin ... :)
upvoted 2 times
...
dyers
3 years, 11 months ago
The purpose seems to be to capture all traffic going to this port on the DMZ device. Since it calls out "forwarding traffic" the only way to capture that traffic is tcpdump, then use something to send it out, which is ssh. This is probably what they're wanting to do: https://serverfault.com/questions/362529/how-can-i-sniff-the-traffic-of-remote-machine-with-wireshark Despite it saying wireshark, as already mentioned wireshark is just a gui for tcpdump which is the packet capture engine. So wireshark could be involved but they only mentioned how to "forward traffic", nothing about capturing it on the other side.
upvoted 1 times
dyers
3 years, 11 months ago
another link regarding this idea: https://bytefreaks.net/applications/how-to-process-tcpdump-live-data-stream-from-a-remote-machine-on-a-local-wireshark
upvoted 1 times
...
...
macr0sss
3 years, 11 months ago
If we agree to understand the question as: which two tools are needed in order to achieve the goal - it might be tcpdump/wireshark (as one tool to dump the traffic) and second one to have secure, encrypted connection to transfer that data.
upvoted 1 times
...
Mo911
4 years, 1 month ago
D. SSH E. Netcat
upvoted 5 times
...
harej8
4 years, 5 months ago
I would go with DE. The following script allows to use both Netcat with SSH for port forwarding: $ mkfifo pipe $ while [ 1 ]; do nc -l -p 8080 < pipe | ssh gw_to_private_net \ -p 22977 "nc 192.168.12.230 80" | tee pipe; done https://jtway.co/netcat-with-ssh-port-forwarding-148177b2e850
upvoted 3 times
TheThreatGuy
4 years, 3 months ago
I would concur with this answer. It doesn't say we need to capture the data. Just forward it. DE would be the best choice here.
upvoted 2 times
...
dyers
3 years, 11 months ago
You misunderstand the article, this is taking a port on a local system and presenting it on another ip and port. So that port would still only be listening on the new ip and port but you won't be seeing any traffic for people still navigating to the original ip and port. Your article and the question are two totally different networking concepts.
upvoted 2 times
...
...
NoImDirtyDan
4 years, 9 months ago
Tcpdump and netcat. Odds are that you only have a shell... tcpdump is the way to go. Then pipe the capture to nc and capture with tcpdump on your end.
upvoted 4 times
...
boblee
4 years, 10 months ago
Its A & E. Please use common sense. Wireshark has nothing to do with forwarding traffic. Jesus christ
upvoted 5 times
kabwitte
4 years, 9 months ago
If Wireshark doesn't have anything to do with forwarding, so does Tcpdump. Tcpdump is just the command line version of Wireshark. They basically do the same thing. Wireshark is GUI and Tcpdump is command-line.
upvoted 1 times
...
mr_robot
4 years, 9 months ago
Yes, it does! https://www.howtoforge.com/wireshark-remote-capturing https://www.howtogeek.com/106191/5-killer-tricks-to-get-the-most-out-of-wireshark/
upvoted 1 times
...
ddiggler
3 years, 6 months ago
A & E zactly
upvoted 1 times
...
...
D1960
4 years, 11 months ago
I asked about this on linuxquestions.org. I think the replies are interesting: https://www.linuxquestions.org/questions/linux-security-4/can-tcpdump-and-or-wireshark-and-or-netcat-forward-traffic-to-another-device-4175672194/
upvoted 1 times
who__cares123456789___
4 years, 2 months ago
So I read and to even use ssh you need to hook it to that RSA key file! Seems those guys are saying to just capture with tcpdump and shoot it out with netcat! I am going with A and E
upvoted 2 times
...
...
D1960
4 years, 12 months ago
According to this article: netcat can be used: "Well, here I would like to point out that you most likely would have used backpipes in linux to bi-directionally port forward traffic using netcat, which also involves using mknod and tee." https://www.esecforte.com/advanced-traffic-pivoting-with-netcat/
upvoted 1 times
...
Teacher6
5 years ago
C and D. In this scenario, the best options are SSH and Wireshark. Secure Shell (SSH) provides secure encrypted connections between systems. SSH provides remote shell access via an encrypted connection. SSH is used for secure command-line access to systems, typically via TCP port 22, and is found on devices and systems of all types. Because SSH is so common, testing systems that provide an SSH service is a very attractive option for a penetration tester. Wireshark is a protocol analyzer that allows penetration testers to eavesdrop on and dissect network traffic. Wireshark also allows for capturing network traffic from wireless networks.
upvoted 1 times
D1960
4 years, 11 months ago
Why not use tcpdump instead of wireshark?
upvoted 1 times
who__cares123456789___
4 years, 2 months ago
You would! Why go thru the headache of trying to install Wireshark over there? Why not use what is natively running on the victim server?
upvoted 1 times
Ariel235788
3 years, 6 months ago
because you dont know if its linux or windows
upvoted 1 times
...
...
...
...
Musaad
5 years ago
I would go with D and E is nmap capable to forward traffic ? https://jtway.co/netcat-with-ssh-port-forwarding-148177b2e850
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago