nerdexam
EC-CouncilEC-Council

312-50V13 · Question #479

312-50V13 Question #479: Real Exam Question with Answer & Explanation

The correct answer is A: getsystem. Explanation getsystem is a Meterpreter post-exploitation command/module in Metasploit that attempts to elevate privileges to SYSTEM level on a compromised Windows machine using techniques like named pipe impersonation and token duplication - making it the clear choice for privile

Submitted by viktor_hu· Mar 6, 2026System Hacking

Question

Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?

Options

  • Agetsystem
  • Bgetuid
  • Ckeylogrecorder
  • Dautoroute

Explanation

Explanation

getsystem is a Meterpreter post-exploitation command/module in Metasploit that attempts to elevate privileges to SYSTEM level on a compromised Windows machine using techniques like named pipe impersonation and token duplication - making it the clear choice for privilege escalation. getuid (B) simply displays the current user identity without changing or escalating any permissions, making it a reconnaissance command rather than an escalation one. keylogrecorder (C) is used for capturing keystrokes on the target system, which is a credential harvesting technique, not privilege escalation. autoroute (D) is a pivoting module used to route traffic through a compromised host to reach other network segments, unrelated to privilege levels.

💡 Memory Tip: Think of the prefix "get" - getsystem gets you to the highest privilege level (SYSTEM), while getuid just gets you information. If the module changes your access level, it's getsystem; if it just shows your access level, it's getuid.

Topics

#Metasploit#Privilege Escalation#Post-exploitation#Windows Hacking

Community Discussion

No community discussion yet for this question.

Full 312-50V13 PracticeBrowse All 312-50V13 Questions