exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 56 discussion

Actual exam question from CompTIA's PT0-002
Question #: 56
Topic #: 1
[All PT0-002 Questions]

SIMULATION -
You are a penetration tester running port scans on a server.

INSTRUCTIONS -
Part 1: Given the output, construct the command that was used to generate this output from the available options.
Part 2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part 1 -


Part 2 -

Show Suggested Answer Hide Answer
Suggested Answer: See explanation below.
Part 1 ג€" Enter command: nmap 192.168.2.2 -sV -O
Part 2 ג€" Weak SMB file permissions

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ryanzou
Highly Voted 2 years, 3 months ago
nmap 192.168.2.2 -O -sV --top-ports=100 and SMB vulns for sure
upvoted 22 times
...
Anarckii
Highly Voted 1 year, 7 months ago
Part 1: nmap -O -sV 192.168.2.2 --top-ports=100 Part 2: SMB vuln and Null session. Reason for both of them is because it's obvious port 139 and 445 is open, so that leave SMB vulnerable to weak file permission. This allows for a null session attack to occur. Just my opinion from my reasearch https://www.blumira.com/glossary/null-session/
upvoted 9 times
...
Fart2023
Most Recent 3 months, 2 weeks ago
nmap -O -sV -p 1-1023 192.168.2.2 is the correct one look at the time it took to scan, 26 sec, the top 100 would be much faster.
upvoted 2 times
pinderanttal
2 weeks, 2 days ago
okay, time is a different thing but it was also mentioned that 96 ports are closed, after showing the result for the remaining 4 ports. if we go with your answer then there should be 1019 ports closed in reference.
upvoted 3 times
...
...
Fart2023
3 months, 2 weeks ago
Part 1: nmap -O -sV 192.168.1.176 --top-ports=100 Or nmap -O -sV -p 1-1023 192.168.1.176 (This one makes more sense) Part 2: Null session enumeration and Weak SMB file permissions
upvoted 1 times
...
HunterxSeb
5 months, 1 week ago
I would say nmap 192.168.2.2 -O ---top-port=100. I don't see the results of -sV, only a rough guessing of service based on port number. For the second part (SMB) Null session enumeration.
upvoted 1 times
...
ElDirec
11 months, 3 weeks ago
nmap 192.168.2.2 -O -sV --top-ports=100 SMB vuln and null session
upvoted 6 times
...
LiveLaughToasterBath
11 months, 3 weeks ago
FYI, that is not an Oracle MAC addy. Belongs to PCS Systemtechnik GmbH, so I'd prob add ARP spoofing.
upvoted 1 times
...
[Removed]
1 year, 1 month ago
PBQ: You are a penetration tester running port scans on a server. • Part 1: nmap 192.168.2.2 -O -sV --top-ports=100 • Part 2: Weak SMB file permissions & Null Session Enumeration
upvoted 6 times
...
DRVision
1 year, 1 month ago
nmap -O -sV -p 1-1023 192.168.2.2 null session + smb exploit
upvoted 2 times
...
MysterClyde
1 year, 7 months ago
If you used --top-ports=1000 or 1000, you are already wrong. Yes the concept is correct but the syntax is wrong. THERE IS NO EQUAL SIGN with the top ports command. It is either --top-ports 1000 or --top-ports 100. https://danielmiessler.com/blog/nmap-use-the-top-ports-option-for-both-tcp-and-udp-simultaneously/. The correct answer is the suggested answer.
upvoted 5 times
surfuganda
9 months, 3 weeks ago
Respectfully, you are not correct. Nmap is generally flexible with its command-line syntax, especially regarding options that take a value, such as --top-ports. Both a space and an equal sign (=) are accepted between the option name and its value. This flexibility in syntax means that Nmap can interpret the option correctly, whether you use a space or an equal sign. So, for the --top-ports option, both of the following are valid and would be correctly understood by Nmap: --top-ports 100 --top-ports=100
upvoted 2 times
...
taylorhung
1 year, 1 month ago
do you try it ? --top-ports=100 or --top-port=100, it works.
upvoted 2 times
...
...
TheSkyMan
1 year, 9 months ago
This is also null session with both ports 139 and 445 being open. https://www.skillset.com/questions/the-null-session-attack-occurs-at-which-port
upvoted 2 times
...
cy_analyst
1 year, 10 months ago
I don't know how many right answers the second part of the question has but 4 out 8 are vulnerabilities that need to further investigate. These are: Port 88/tcp: Kerberos-sec: This may be vulnerable to a Kerberos authentication bypass attack or password brute-forcing. Port 139/tcp: NetBIOS-ssn: This may be vulnerable to a NetBIOS-based attack, such as brute-forcing, relay attacks, or SMB exploits. Port 389/tcp: LDAP: This may be vulnerable to LDAP injection attacks, which can allow an attacker to modify, add, or delete data in the directory or perform unauthorized searches. Port 445/tcp: Microsoft-ds: This may be vulnerable to SMB exploits, such as EternalBlue, SMBGhost, or SMBRelay attacks.
upvoted 2 times
[Removed]
1 year, 10 months ago
The right answer in this queation Part 1- Nmap 192.168.2.2 -O-SV--topports=100 Part 2- Weak SMB file permission because the 4 ports open its SMB Vulner
upvoted 2 times
KingIT_ENG
1 year, 10 months ago
right answer
upvoted 1 times
...
...
...
Frog_Man
1 year, 10 months ago
Let's look at this: nmap -sV -O 192.168.2.2 --top-ports=100
upvoted 1 times
[Removed]
1 year, 10 months ago
nmap 192.168.2.2 -O-SV--top-ports=100 Weak SMB file Permission
upvoted 2 times
...
...
2Fish
1 year, 11 months ago
Ran this on my tryhackme VM (diff IP of course) and the output is correct: Part 1: nmap 192.168.2.2 -O -sV --top-ports=100 Part 2: I wanna say SMB vulnerability. For more context see: https://www.examtopics.com/discussions/comptia/view/66556-exam-pt1-002-topic-1-question-12-discussion/
upvoted 6 times
2Fish
1 year, 11 months ago
I would add Null session as well with port 139 and SMB with port 445.
upvoted 5 times
[Removed]
1 year, 11 months ago
Part 1: nmap 192.168.2.2 -o-sv-- top = ports100 Part 2: Weak SMB file Permissions
upvoted 3 times
...
user82
10 months, 3 weeks ago
Do yall who keep saying "SMB vulnerability" mean "weak SMB file persmissions"? Because looking above, "SMB vulnerability" is not a possible answer choice.
upvoted 2 times
...
...
...
RightAsTain
2 years, 3 months ago
nmap -O osV 192.168.2.2 --top-ports=100 4 ports identified and 96 not. By default the first 1000 well known ports are scanned and add null session enumeration in there too. Not sure about smb but all the others look wrong. Kerberos is in there too and netbios ns so ms-ds might actually be 445 and not smb.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago