nerdexam
EC-CouncilEC-Council

312-50V13 · Question #531

312-50V13 Question #531: Real Exam Question with Answer & Explanation

The correct answer is B: Probe the IPC share by attempting to brute force admin credentials. Explanation Probing the IPC$ share by attempting to brute force admin credentials (Option B) is the most appropriate technique because IPC$ (Inter-Process Communication) shares in Windows environments are commonly targeted to establish null sessions or authenticated connections,

Submitted by diego_uy· Mar 6, 2026Enumeration

Question

A penetration tester is performing an enumeration on a client's network. The tester has acquired permission to perform enumeration activities. They have identified a remote inter-process communication (IPC) share and are trying to collect more information about it. The tester decides to use a common enumeration technique to collect the desired data. Which of the following techniques would be most appropriate for this scenario?

Options

  • ABrute force Active Directory
  • BProbe the IPC share by attempting to brute force admin credentials
  • CExtract usernames using email IDs
  • DConduct a DNS zone transfer

Explanation

Explanation

Probing the IPC$ share by attempting to brute force admin credentials (Option B) is the most appropriate technique because IPC$ (Inter-Process Communication) shares in Windows environments are commonly targeted to establish null sessions or authenticated connections, allowing testers to enumerate users, groups, shares, and other sensitive network information. When a tester has identified an IPC share, brute forcing admin credentials is a direct and relevant enumeration method to gain access to that specific resource and extract meaningful data about the system.

Why the distractors are wrong:

  • Option A (Brute force Active Directory) is too broad and not specifically targeted at the IPC share that has already been identified - it's a different attack surface entirely.
  • Option C (Extract usernames via email IDs) is a passive reconnaissance technique used before active enumeration, not a method suited for probing a discovered IPC share.
  • Option D (DNS zone transfer) is a network reconnaissance technique targeting DNS servers to map domain infrastructure, which has no direct relationship to IPC share enumeration.

Memory Tip

Think "IPC = I'll Probe Credentials" - when you find an IPC share, the logical next step is to probe it using credentials, since IPC shares are the gateway to Windows resource and user enumeration.

Topics

#Enumeration#IPC Share#Brute Force#Credential Attack

Community Discussion

No community discussion yet for this question.

Full 312-50V13 PracticeBrowse All 312-50V13 Questions