nerdexam
CompTIACompTIA

PT0-002 · Question #108

PT0-002 Question #108: Real Exam Question with Answer & Explanation

To identify misconfigured service permissions, a penetration tester would use commands to list Windows service properties, specifically their executable paths.

Post-exploitation and lateral movement

Question

A penetration tester has obtained a low-privilege shell on a Windows server with a default configuration and now wants to explore the ability to exploit misconfigured service permissions. Which of the following commands would help the tester start this process? 'systeminfo.txt')

Options

  • Cschtasks /query /fo LIST /v | find /I "Next Run Time:"

Explanation

To identify misconfigured service permissions, a penetration tester would use commands to list Windows service properties, specifically their executable paths.

Common mistakes.

  • C. The 'schtasks /query' command is used to list scheduled tasks on a Windows system and does not provide information about Windows service configurations or permissions.

Concept tested. Windows service enumeration for misconfiguration

Reference. https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/wmic-service

Topics

#Privilege Escalation#Service Enumeration#Windows Post-exploitation#Misconfigured Services

Community Discussion

No community discussion yet for this question.

Full PT0-002 PracticeBrowse All PT0-002 Questions