exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 14 discussion

Actual exam question from CompTIA's PT0-001
Question #: 14
Topic #: 1
[All PT0-001 Questions]

A penetration tester executes the following commands:

Which of the following is a local host vulnerability that the attacker is exploiting?

  • A. Insecure file permissions
  • B. Application whitelisting
  • C. Shell escape
  • D. Writable service
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️
Reference:
https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/#john-the-ripper---jtr

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mr_robot
Highly Voted 5 years ago
I would go for A. – accesschk is a command line tool designed to show what kind of accesses specific users or groups have to resources including files, directories, Registry keys, global objects and Windows services. In this scenario, I believe the pentester is using accesschk to search C:\Windows folder recursively showing all folders the account has write (rw) access to. https://docs.microsoft.com/en-us/sysinternals/downloads/accesschk -w Show only objects that have write access -s Recurse -q Omit Banner -u Suppress errors
upvoted 16 times
...
D1960
Highly Voted 5 years, 1 month ago
As is often the case, I do not see where the reference supports the answer. I understand that jtr.exe is the password cracking tool "John the Ripper" but that does not prove the problem here is insecure file permissions. Is the following the command that demonstrates insecure file permissions? C:\>copy %userprofile%\jtr.exe C:\Windows\Tracing
upvoted 5 times
who__cares123456789___
4 years, 3 months ago
looks like he was blocked in one dir, checked his access in that /Tracing dir (saw read-write) copied payload over to /Tracing and ran it from there...just my take...had no permission on one file, had permission on another...answer seems to check out IMO
upvoted 8 times
...
...
kloug
Most Recent 2 years, 2 months ago
aaaaaaaaaaaaaa
upvoted 1 times
...
miabe
2 years, 9 months ago
Selected Answer: A
looks good to me
upvoted 2 times
...
brandonl
3 years, 1 month ago
witeable services also use accesschk, but with different flags. insecure file permissions will involve moving a file to a directory with more permissions, i.e., read and wrire (rw). writable services will literally show a service being set to the malicious file. A is correct.
upvoted 1 times
...
wjy920108
3 years, 5 months ago
Selected Answer: D
D. Similar question from Jason Dion practice: Some Windows services are run with SYSTEM privileges and may have been misconfigured by the administrator. In this case, Jason used the accesschk tool from SysInternals to find any writeable services that his user account could access. One was returned: Apache. He then stopped the service and rewrote the binary path loaded by the service to "net localgroup administrators jason /add", which will be run the next time the service is started. This will add Jason's user account (jason) to the administrators group. Next, he started the service, completing his privilege escalation through the use of writeable services.
upvoted 1 times
TitoChuz
3 years, 2 months ago
I was reading Jasons study guide and its definition of writable services doesn't match, ● Writable services o Using PSExec, a service can be replaced with a custom service that runs a command shell (cmd.exe) o Unsecure File and Folder Permissions ▪ Older versions of Windows allow administrators to access any non-admin user’s files and folders ▪ Can lead to DLL hijacking and malicious file installations on a non-admin targeted user Ill go for A, according to definitions, I have leaned that CompTIA is picky when it comes to that
upvoted 1 times
...
...
triapila
3 years, 9 months ago
maybe the answer is D because writable service uses accesschk
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago