exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 148 discussion

Actual exam question from CompTIA's PT0-002
Question #: 148
Topic #: 1
[All PT0-002 Questions]

A penetration tester has established an on-path position between a target host and local network services but has not been able to establish an on-path position between the target host and the Internet. Regardless, the tester would like to subtly redirect HTTP connections to a spoofed server IP. Which of the following methods would BEST support the objective?

  • A. Gain access to the target host and implant malware specially crafted for this purpose.
  • B. Exploit the local DNS server and add/update the zone records with a spoofed A record.
  • C. Use the Scapy utility to overwrite name resolution fields in the DNS query response.
  • D. Proxy HTTP connections from the target host to that of the spoofed host.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
superb446
Highly Voted 2 years ago
I agree that proxy can redirect you to spoofed host, however the question mentioned "not been able to establish an on-path position between the target host and the Internet." Modified DNS Server done during pentest must be cleanup during post engagement as thaught by the pentest+ lecture. Answer should be B.
upvoted 8 times
shakevia463
1 year, 8 months ago
penetration tester has established an on-path position between a target host and local network services
upvoted 1 times
...
...
nickwen007
Highly Voted 1 year, 7 months ago
Selected Answer: B
The best method to support the objective is B. Exploit the local DNS server and add/update the zone records with a spoofed A record. This method allows the tester to redirect HTTP connections to a spoofed server IP, without gaining access to the target host or implanting malware. Using the Scapy utility to overwrite name resolution fields in the DNS query response is not recommended, as it is unreliable and can be detected. Proxying HTTP connections from the target host to that of the spoofed host is also not recommended, as it can easily be detected.
upvoted 7 times
...
broman
Most Recent 2 months, 1 week ago
Selected Answer: C
The penetration tester has already established an on-path (Man-in-the-Middle) position between the target and local network services (but not between the target and the Internet). This means the tester can intercept and manipulate local network traffic, including DNS requests.
upvoted 1 times
...
yeti87
7 months, 3 weeks ago
Selected Answer: C
It states that the penetration tester is between the target and the local network services. So he can already intercept the communication. Also the network services most likely include the DNS service. So he could easily use Scapy (C) and reply to the DNS queries with the spoofed server IP... All other answers require actual access to either the target machine or one of the network services.
upvoted 6 times
...
PhillyCheese
10 months, 1 week ago
Selected Answer: B
One of the skills that a pentester needs is to establish an on-path position, which means to intercept and modify the traffic between two hosts. This can be done by using techniques such as ARP spoofing, DNS spoofing, or ICMP redirection. 🚧
upvoted 1 times
...
4vv
1 year, 2 months ago
Selected Answer: C
C. Use the Scapy utility to overwrite name resolution fields in the DNS query response.
upvoted 4 times
...
solutionz
1 year, 2 months ago
Selected Answer: B
Explanation: - Option A: Implanting malware on the target host is a more overt and aggressive method, and it doesn't align with the subtle approach described in the scenario. - Option B: By exploiting the local DNS server to change the A record (Address Record), all queries for a specific domain name can be redirected to a different IP address, such as the spoofed server IP. This approach fits the requirement of subtly redirecting HTTP connections without needing to control the path between the target host and the Internet. - Option C: The Scapy utility could be used to craft and manipulate packets, but the scenario doesn't indicate that the tester has the ability to intercept and modify DNS responses between the target host and the Internet. - Option D: Proxying HTTP connections is a valid technique, but it generally requires the ability to intercept traffic between the target host and the Internet, which the scenario states the tester has not been able to achieve. in this case option B ftw
upvoted 2 times
...
cy_analyst
1 year, 6 months ago
Selected Answer: D
The penetration tester would set up a proxy server on their machine or on a compromised machine on the local network. The tester would then configure the target host to use the proxy server for all HTTP traffic. When the target host makes an HTTP request, the request would first go to the proxy server. The proxy server would then forward the request to the legitimate server and receive the response. Before forwarding the response to the target host, the proxy server would modify the response to point to the spoofed server IP instead of the legitimate server IP. The target host would then receive the modified response, which would contain the spoofed server IP, and would establish a connection to the spoofed server.
upvoted 3 times
...
lifehacker0777
1 year, 7 months ago
Selected Answer: B
__BBB__
upvoted 1 times
...
[Removed]
1 year, 7 months ago
B is the correct answer
upvoted 2 times
...
[Removed]
1 year, 7 months ago
B is correct answer
upvoted 2 times
...
kloug
1 year, 8 months ago
dddddddddd
upvoted 1 times
[Removed]
1 year, 8 months ago
B is correct
upvoted 2 times
...
...
[Removed]
1 year, 8 months ago
B is the best answer
upvoted 1 times
...
som3onenooned1
1 year, 11 months ago
Selected Answer: D
B and D will work. If you want to do this subtly, you should not modify the local DNS server, because all users will be impacted. Proxy for one target is perfect for this task.
upvoted 5 times
RRabbit_111
1 year, 9 months ago
dont take for certain but consider: Option D. "Proxy HTTP connections from the target host to that of the spoofed host" is wrong because it does not achieve the objective of redirecting the HTTP connections to the spoofed server IP. Proxying connections means that the target host would still be sending its HTTP connections to the intended server, but the connections would be routed through the proxy server before reaching the intended server. This would not allow the tester to redirect the connections to the spoofed server IP. Additionally, proxying connections would require the tester to have access to the target host or to be able to intercept the connections, which is not stated in the scenario.
upvoted 6 times
[Removed]
1 year, 9 months ago
which answer is correct?
upvoted 1 times
Vikt0r
1 year, 8 months ago
B is the correct answer
upvoted 3 times
...
...
...
...
Manzer
2 years ago
Selected Answer: D
I would not want a pen tester to modify my local DNS server with bad records.
upvoted 2 times
superb446
2 years ago
I agree that proxy can redirect you to spoofed host, however the question mentioned "not been able to establish an on-path position between the target host and the Internet." Modified DNS Server done during pentest must be cleanup during post engagement as thaught by the pentest+ lecture. Answer should be B.
upvoted 7 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago