exam questions

Exam PT0-003 All Questions

View all questions & answers for the PT0-003 exam

Exam PT0-003 topic 1 question 15 discussion

Actual exam question from CompTIA's PT0-003
Question #: 15
Topic #: 1
[All PT0-003 Questions]

A penetration tester established an initial compromise on a host. The tester wants to pivot to other targets and set up an appropriate relay. The tester needs to enumerate through the compromised host as a relay from the tester's machine. Which of the following commands should the tester use to do this task from the tester's host?

  • A. attacker_host$ nmap -sT <target_cidr> | nc -n <compromised_host> 22
  • B. attacker_host$ mknod backpipe p
    attacker_host$ nc -l -p 8000 | 0 <backpipe | nc <target_cidr> 80 | tee backpipe
  • C. attacker_host$ nc -nlp 8000 | nc -n <target_cidr>
    attacker_host$ nmap -sT 127.0.0.1 8000
  • D. attacker_host$ proxychains nmap -sT <target_cidr>
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
hustledhaili
4 weeks ago
Selected Answer: D
ProxyChains routes all traffic through a compromised host (pivoting). This allows a pentester to scan other network segments while avoiding direct detection. Commonly used for internal reconnaissance and lateral movement after compromising a foothold.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago