exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 123 discussion

Actual exam question from CompTIA's PT0-001
Question #: 123
Topic #: 1
[All PT0-001 Questions]

Joe, a penetration tester, has received basic account credentials and logged into a Windows system. To escalate his privilege, from which of the following places is he using Mimikatz to pull credentials?

  • A. LSASS
  • B. SAM database
  • C. Active Directory
  • D. Registry
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
boblee
Highly Voted 4 years, 10 months ago
A is correct.
upvoted 9 times
...
mr_robot
Highly Voted 5 years ago
I would go for A too. https://gracefulsecurity.com/privesc-dumping-passwords-in-plaintext-mimikatz/
upvoted 6 times
Setsunarcangel
3 years ago
Arguably, one of the most known forms of credential stealing is surrounding clear-text credentials by accessing lsass.exe. Almost synonymous with credential dumping is the popular tool Mimikatz, which is able to access the LSASS (Local Security Authority Subsystem Service) memory space and extract these clear-text credentials.
upvoted 1 times
...
...
kloug
Most Recent 2 years, 2 months ago
aaaaaaaaaaaa
upvoted 1 times
...
miabe
2 years, 9 months ago
Selected Answer: A
looks good to me
upvoted 1 times
...
Nana1990
3 years ago
Selected Answer: A
LSASS store a variety of user, services and applications passwords
upvoted 1 times
...
cuernov
3 years ago
Selected Answer: A
Mimikatz allows you to extract these passwords from the memory of the LSASS. EXE process.
upvoted 1 times
...
anonamphibian
3 years, 2 months ago
LSASS would be the first guess, but AD can be correct under the right circumstances using DCSync remotely, but this requires Admin rights to use or be on the DC locally. Both of which arent defined and i then fall back to my original answer A. LSASS.
upvoted 1 times
...
DohJayVeh
3 years, 5 months ago
LSASS would give you persistence but the machine only stores passwords as hashes so you would need to use minikatz to retrieve the hash from the machine and escalate via the active directory
upvoted 1 times
...
carletten
3 years, 8 months ago
A is correct : Mimikatz is an open source Windows utility available for download from GitHub. First developed in 2007 to demonstrate a practical exploit of the Microsoft Windows Local Security Authority Subsystem Service, or LSASS, Mimikatz is capable of dumping account login information, including clear text passwords stored in system memory.
upvoted 2 times
...
farziuser
3 years, 8 months ago
A Lsass
upvoted 2 times
...
CybeSecN
3 years, 8 months ago
I think the correct answer is 'A'
upvoted 2 times
...
CybeSecN
3 years, 8 months ago
I would go for C
upvoted 1 times
...
smalltech
3 years, 10 months ago
A.Mimikatz is a tool that was designed to harvest credentials from Windows memory and disk. It is designed to be used as part of post-exploitation and requires elevated credentials on a system to run. It has multiple modules and the ability to dump credentials from LSASS, the registry, and various other credential stores. Mimikatz is included in a number of other security tools, and is the most popular way to steal credentials from memory.
upvoted 2 times
...
sn0wman321
5 years ago
Penetration testers often focus on using the easiest attack vector to achieve their objectives. One common attack method is a tool called Mimikatz. It can steal cleartext credentials from the memory of compromised Windows systems. When the WDigest Authentication protocol is enabled, plaintext passwords are stored in the Local Security Authority Subsystem Service (LSASS), exposing them to theft
upvoted 2 times
...
D1960
5 years ago
Maybe: A. LSASS ? According to Sybex Pentest Practice Tests: "Mimikatz is an open source utility that enables the viewing of credential information from the Windows Local Security Authority Subsystem Service (LSASS) using its sekurlsa module"
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago