nerdexam
EC-CouncilEC-Council

312-50V12 · Question #74

312-50V12 Question #74: Real Exam Question with Answer & Explanation

The correct answer is D: Credential enumerator. Credential enumerator: a self-extracting RAR file containing two components, a bypass and a service component. The bypass component is used for enumeration of network resources and either finds writable share drives using Server Message Block (SMB) or tries to brute force user ac

Submitted by fernanda_arg· Mar 4, 2026System Hacking Phases and Attack Techniques

Question

Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device, Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives. What is the tool employed by Mason in the above scenario?

Options

  • ANetPass.exe
  • BOutlook scraper
  • CWebBrowserPassView
  • DCredential enumerator

Explanation

Credential enumerator: a self-extracting RAR file containing two components, a bypass and a service component. The bypass component is used for enumeration of network resources and either finds writable share drives using Server Message Block (SMB) or tries to brute force user accounts, including the administrator account. Once an available system is found, Emotet then writes the service component on the system, which writes Emotet onto the disk. Access to SMB can result in entire domains (servers and clients) becoming infected.

Topics

#Emotet#Malware#Credential enumeration#Network shares

Community Discussion

No community discussion yet for this question.

Full 312-50V12 PracticeBrowse All 312-50V12 Questions