nerdexam
CompTIACompTIA

PT0-002 · Question #116

PT0-002 Question #116: Real Exam Question with Answer & Explanation

The correct answer is A: RID cycling to enumerate users and groups. One of the first steps when looking to gain access to a host, system, or application is to enumerate usernames. Once usernames are guessed, targeted password-based attacks can then be attempted. A RID cycling attack attempts to enumerate user accounts through null sessions. If a

Attacks and Exploits

Question

A tester has determined that null sessions are enabled on a domain controller. Which of the following attacks can be performed to leverage this vulnerability?

Options

  • ARID cycling to enumerate users and groups
  • BPass the hash to relay credentials
  • CPassword brute forcing to log into the host
  • DSession hijacking to impersonate a system account

Explanation

One of the first steps when looking to gain access to a host, system, or application is to enumerate usernames. Once usernames are guessed, targeted password-based attacks can then be attempted. A RID cycling attack attempts to enumerate user accounts through null sessions. If a tester specifies a password file, it will automatically attempt to brute force the user accounts when it’s finished enumerating. So, in this scenario, attempting RID cycling will be the next step the tester should try.

Topics

#Null sessions#RID cycling#User enumeration#Vulnerability exploitation

Community Discussion

No community discussion yet for this question.

Full PT0-002 PracticeBrowse All PT0-002 Questions