Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You have compromised a Windows XP system and Injected the Meterpreter payload into the lsass process. While looking over the system you notice that there is a popular password management program on the system. When you attempt to access the file that contains the password you find it is locked. Further investigation reveals that it is locked by the passmgr process. How can you use the Meterpreter to get access to this file?

A.

Use the getuid command to determine the user context the process is runningunder, then use the imp command to impersonate that user.

B.

use the getpid command to determine the user context the process is runningunder, then use the Imp command to impersonate that user.

C.

Use the execute command to the passmgr executable. That will give you access to

the file.

D.

Use the migrate command to jump to the passmgr process. That will give you accessto the file.

What is the purpose of the following command?

C:\>wmic /node:[target IP] /user:[admin-user]

/password:[password] process call create [command]

A.

Running a command on a remote Windows machine

B.

Creating a service on a remote Windows machine

C.

Creating an admin account on a remote Windows machine

D.

Listing the running processes on a remote windows machine

You are conducting a penetration test for a private contractor located in Singapore. The scope extends to all internal hosts controlled by the company, you have gathered necessary hold-harmless and nondisclosure agreements. Which action by your group can incur criminal liability under Chapter 50a, Computer Misuse Act?

A.

Exploiting vulnerable web services on internal hosts

B.

Attempts at social engineering employees via telephone calls

C.

Testing denial-of-service tolerance of the communications provider

D.

Cracking password hashes on the corporate domain server

Analyze the command output below, what action is being performed by the tester?

A.

Displaying a Windows SAM database

B.

Listing available workgroup services

C.

Discovering valid user accounts

D.

Querying locked out user accounts

A penetration tester wishes to stop the Windows Firewall process on a remote host running Windows Vista She issues the following commands:

A check of the remote host indicates that Windows Firewall is still running. Why did the command fail?

A.

The kernel prevented the command from being executed.

B.

The user does not have the access level needed to stop the firewall.

C.

The sc command needs to be passed the IP address of the target.

D.

The remote server timed out and did not complete the command.

In the screen shot below, which selections would you need click in order to intercept and alter all http traffic passing through OWASP ZAP?

A.

Trap response and continue

B.

Set Break and Continue

C.

Trap request and continue

D.

Continue and drop

Analyze the screenshot below. What event is depicted?

A.

An exploit that was attempted does not work against the target selected.

B.

A payload was used that is not compatible with the chosen exploit.

C.

The exploit is designed to work against the local host only.

D.

The payload Is designed to create an interactive session.

A penetration tester used a client-side browser exploit from metasploit to get an unprivileged shell prompt on the target Windows desktop. The penetration tester then tried using the getsystem command to perform a local privilege escalation which failed. Which of the following could resolve the problem?

A.

Load priv module and try getsystem again

B.

Run getuid command, then getpriv command, and try getsystem again

C.

Run getuid command and try getsystem again

D.

Use getprivs command instead of getsystem

Which of the following is the number of bits of encryption that 64-bit Wired Equivalent Privacy (WEP) effectively provides?

A.

64

B.

40

C.

60

D.

44

You are pen testing a system and want to use Metasploit 3.X to open a listening port on the system so you can access it via a netcat shell. Which stager would you use to have the system listen on TCP port 50000?

A.

Reverse.tcp

B.

Bind.tcp

C.

Fincltag.ord

D.

Passivex