Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 140 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 140
Topic #: 1
[All 312-50v12 Questions]

XYZ company recently discovered a potential vulnerability on their network, originating from misconfigurations. It was found that some of their host servers had enabled debugging functions and unknown users were granted administrative permissions. As a Certified Ethical Hacker, what would be the most potent risk associated with this misconfiguration?

  • A. An attacker may be able to inject a malicious DLL into the current running process
  • B. Weak encryption might be allowing man-in-the-middle attacks, leading to data tampering
  • C. Unauthorized users may perform privilege escalation using unnecessarily created accounts
  • D. An attacker may carry out a Denial-of-Service assault draining the resources of the server in the process
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
lmourikis
Highly Voted 8 months, 2 weeks ago
I believe it's not C, as unknown users have already been granted administrative permissions. Also, there is nowhere mentioned that unnecessarily accounts have been created. Also, not B or D, as these type of attacks do not require gaining admin permissions on a system. The problem with unkown users getting admin perms is that they can change the code the server is running, eg by injecting a malicious DLL. So, it's A.
upvoted 5 times
...
Binx
Most Recent 3 months, 2 weeks ago
I believe the answer is A Yes, it is possible for an attacker to inject a malicious DLL through a server debugging tool, especially if debugging functions are enabled and not properly secured. Here’s how: Exploiting Debugging Functions: Debugging tools often have elevated privileges and direct access to the system memory and processes. If an attacker gains access to these debugging functions, they can manipulate the system in various ways, including injecting malicious code. DLL injection is a technique used to run malicious code within the address space of another process by loading a dynamic link library (DLL). If debugging functions are enabled, an attacker with access can use these tools to load their malicious DLL into a RUNNING PROCESS.
upvoted 1 times
...
f257c4e
5 months, 4 weeks ago
I think Is A, why bother in priv esc if the user has already administrative account?!?
upvoted 1 times
...
LordXander
8 months ago
Selected Answer: C
Why bother with A when you can aleady have system access by using C. Also AI says C, the book says A & C, and C makes more sense...so C
upvoted 1 times
...
qtygbapjpesdayazko
8 months, 2 weeks ago
Selected Answer: A
Is C. Key words "unknown users were granted administrative permissions"
upvoted 2 times
qtygbapjpesdayazko
8 months, 2 weeks ago
IS C!!!!
upvoted 1 times
...
...
[Removed]
9 months, 2 weeks ago
Could someone please validate this information
upvoted 1 times
...
[Removed]
9 months, 2 weeks ago
Could someone help me confirm the accuracy of this data
upvoted 1 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: C
C. Unauthorized users may perform privilege escalation using unnecessarily created accounts
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...