exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 132 discussion

Actual exam question from CompTIA's PT0-001
Question #: 132
Topic #: 1
[All PT0-001 Questions]

After establishing a shell on a target system, Joe, a penetration tester is aware that his actions have not been detected. He now wants to maintain persistent access to the machine. Which of the following methods would be MOST easily detected?

  • A. Run a zero-day exploit.
  • B. Create a new domain user with a known password.
  • C. Modify a known boot time service to instantiate a call back.
  • D. Obtain cleartext credentials of the compromised user.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
harej8
Highly Voted 4 years, 5 months ago
I would go with B. Out of all the options this one would be the easiest to spot, especially if there is a user creation process in place.
upvoted 11 times
someguy1393
4 years, 4 months ago
Agreed
upvoted 2 times
...
tester27
3 years, 10 months ago
agreed. C might not be easy to spot, especially if its already a known service, this would require further investigation like checking the command/executable the service is calling. This is coming from a support perspective that deals with these issues everyday. :)
upvoted 1 times
...
...
lzuvblwh
Highly Voted 4 years, 6 months ago
Answer B
upvoted 7 times
novac1111
4 years, 5 months ago
B? Why?
upvoted 1 times
...
...
kloug
Most Recent 2 years, 2 months ago
cccccccccc
upvoted 1 times
...
miabe
2 years, 9 months ago
Selected Answer: B
looks good to me
upvoted 1 times
...
GDLY
3 years ago
Its got to be B. My company has systems in place so that ANY new domain user account created is alarmed and reviewed. The "Known" password part just means the hacker knows the password. Anyone saying "But sir, Local Account". The answer specifically states new *domain* user. Not a good question, but B is by far the easiest to detect with alerts in place.
upvoted 1 times
...
anonamphibian
3 years, 2 months ago
Remeber its not saying Domain Admin, instead it says Domain User. Meaning any account with any level of privilege's. Identifying this would be difficult, especially if his shell on a target host hasnt been detected yet, pointing towards a weak blue team. With that said id say the answer is Modifying a "KNOWN" boot time service. As this is probably the only thing they would be aware of.
upvoted 1 times
anonamphibian
3 years, 2 months ago
Domain users - anybody who has a user account and has authenticated within the domain. Their level of rights in the domain could be at any level granted to them. Domain Administrators - Users granted "God-Like" authority within the domain to access and modify practically anything and everything.
upvoted 1 times
...
...
Ariel235788
3 years, 6 months ago
I can see B, youre jacking with a DC if you're creating a new domain account. Likely the security team will have alerts set up on a DC to watch for new user accounts. Unless the security team has finely tuned tools, they wont capture a local machine having a modification, especially if the pentester is using an admin account. DC logs are harder to erase and easier to see than local machine
upvoted 1 times
...
urisoft
3 years, 6 months ago
My 2cents: Is not A for sure. Is not B because that would be stupid, think about it what is the difference between creating a new domain user with a known password vs. creating a new domain user with an unknown password???? Is not D because that makes you thing about some sort of bruteforce but you are already in, so the most that is valid to me would be C. B. would be valid if it was like "Create a new domain user"
upvoted 2 times
...
patinho777
3 years, 9 months ago
Hello guys! A friend of mine told me that the correct answer was D, and yes, I know, I was TF?! And he told me that you can easily detect them with a simple script, this is one of the software that he has used in the past. https://logrhythm.com/blog/clear-text-passwords-use-case/ "Using a simple Analyze query on NetMon, you can detect clear text passwords sent over HTTP." What are your thoughts?
upvoted 1 times
rose_y
3 years, 6 months ago
Your friend is probably right but I doubt that's the answer comptia wants.
upvoted 1 times
...
...
smalltech
3 years, 9 months ago
B. Creation of a new user account is a tried-and-true method for retaining access to a system. In well-managed and monitored environments, adding an account is likely to be caught and result in an alarm, but in many environments creation of a local user account on a system may allow ongoing access to the system, device, or application.
upvoted 2 times
...
boyladdudeman
4 years, 1 month ago
Question: MOST easily ***detected*** Scripting a callback (reverse shell) on reboot would be detectable through network monitoring, most SIEMs when checking for unusual but repeated outbound network connection (splunk / elk etc)
upvoted 3 times
...
RedbyNight
4 years, 2 months ago
I was tending to option C but I think B is correct. C may be detectable by an AV suite, but maybe not and the use of 'boot time' would probably suggest that they want you to think root kit. Which they want you to think is difficult to detect. Option B can be spotted by good procedures and not rely on technology.
upvoted 2 times
...
Acidscars
4 years, 4 months ago
None of these are great answers. If the domain had 10 people, definitively B. In a domain with thousands of users, it would be hard to track this down unless some sort of alert was generated when a new user was created. If you just create a Steve Smith and dump him in an OU with 200 people, no one will know. C seems like the more obvious choice but maybe that was intentional to be misleading. I have no answer, merely conjecture.
upvoted 3 times
tester27
3 years, 9 months ago
creation of account usually have been logged. just ask admins if that user should have been created at that time.
upvoted 1 times
...
...
novac1111
4 years, 6 months ago
Answer A. This is the most easy way because you can prevent it by applying the last patches of the system.
upvoted 1 times
someguy1393
4 years, 4 months ago
It's not asking which is the easiest to prevent, it's asking which is the easiest to detect.
upvoted 1 times
...
Acidscars
4 years, 4 months ago
A Zero Day exploit may not have patches to address it yet. Hence, Day Zero.
upvoted 1 times
casandre123
3 years, 7 months ago
But then there are no rules created on IDS/IPS/FW to detect that Zero Day attack, hence I wouldn't say that's the most detectable one. Actually Zero days go unnoticed sometimes for months at a time.
upvoted 1 times
...
...
who__cares123456789___
4 years, 3 months ago
TF? It's asking which hacker's method of maintaining persistence is most easily discovered by the blue team... At first glance you want to say create an account...but with 100s of accounts, an additional J.Smith may go UN-noticed. Moreso than getting a service to call back? A truly subjective question.
upvoted 1 times
tester27
3 years, 9 months ago
yes, but if you have a system that monitors AD account creation, this would be easy. just ask the administrator if there should be a newly created account that time.
upvoted 1 times
...
...
boyladdudeman
4 years, 1 month ago
zerodays don't have patches available. The recent exchange vulnerability existed for 10 years before it was patched.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago