nerdexam
CompTIACompTIA

PT0-002 · Question #564

PT0-002 Question #564: Real Exam Question with Answer & Explanation

The correct answer is A: sudo python3 Responder.py -I eth0 -i 10.0.0.0/16. The Responder tool is commonly used for detecting and exploiting SMB-related vulnerabilities, including SMB relay attacks. It listens for requests on a network and identifies systems vulnerable to attacks by poisoning LLMNR, NBT-NS, or mDNS queries. - The -I eth0 option specifies

Reconnaissance and enumeration

Question

A penetration tester is looking for insecure configurations. The tester wants to identify all hosts on the 10.0.0.0/16 network that are potentially vulnerable to an SMB relay attack. Which of the following reconnaissance commands is best for this task?

Options

  • Asudo python3 Responder.py -I eth0 -i 10.0.0.0/16
  • Bsudo python3 Icmp-Redirecr.py -r eth0 -i 10.0.0.0/16
  • Csudo python3 RunFinger.py -i 10.0.0.0/16
  • Dsudo python3 MultiRelay.py -i 10.0.0.0/16

Explanation

The Responder tool is commonly used for detecting and exploiting SMB-related vulnerabilities, including SMB relay attacks. It listens for requests on a network and identifies systems vulnerable to attacks by poisoning LLMNR, NBT-NS, or mDNS queries. - The -I eth0 option specifies the network interface. - The -i 10.0.0.0/16 option defines the network range to scan. By running this command, the tester can identify systems on the specified network that are misconfigured and susceptible to an SMB relay attack.

Topics

#SMB Relay#Reconnaissance#Responder#Network Enumeration

Community Discussion

No community discussion yet for this question.

Full PT0-002 PracticeBrowse All PT0-002 Questions