PT0-002 · Question #116
PT0-002 Question #116: Real Exam Question with Answer & Explanation
The correct answer is A: RID cycling to enumerate users and groups. One of the first steps when looking to gain access to a host, system, or application is to enumerate usernames. Once usernames are guessed, targeted password-based attacks can then be attempted. A RID cycling attack attempts to enumerate user accounts through null sessions. If a
Question
A tester has determined that null sessions are enabled on a domain controller. Which of the following attacks can be performed to leverage this vulnerability?
Options
- ARID cycling to enumerate users and groups
- BPass the hash to relay credentials
- CPassword brute forcing to log into the host
- DSession hijacking to impersonate a system account
Explanation
One of the first steps when looking to gain access to a host, system, or application is to enumerate usernames. Once usernames are guessed, targeted password-based attacks can then be attempted. A RID cycling attack attempts to enumerate user accounts through null sessions. If a tester specifies a password file, it will automatically attempt to brute force the user accounts when it’s finished enumerating. So, in this scenario, attempting RID cycling will be the next step the tester should try.
Topics
Community Discussion
No community discussion yet for this question.