nerdexam
CompTIACompTIA

PT0-003 · Question #291

PT0-003 Question #291: Real Exam Question with Answer & Explanation

Sign in or unlock PT0-003 to reveal the answer and full explanation for question #291. The question stem and answer options stay visible for context.

Submitted by certguy· Mar 6, 2026Attacks and Exploits

Question

A penetration tester gains low-privilege shell access to a host and discovers a world-writable script that is run regularly as root. The tester runs the following command: openssl passwd password $1$OjxLvZ85$Fdr51vn/Z4zXWsQR/Xrj. The tester then adds the following line to the world-writable script: echo 'root2:$1$0jxLvZ85$Fdr51vn/Z4zXWsQR/Xrj .: 1001:1001:,,,:/root:/bin/bash">> /etc/passwd Which of the following should the penetration tester do to enable this exploit to work correctly?

Options

  • AUse only a single redirect to /etc/password.
  • BGenerate the password using md5sum.
  • CLog in to the host using SSH.
  • DChange the 1001 entries to 0.

Unlock PT0-003 to see the answer

You've previewed enough free PT0-003 questions. Unlock PT0-003 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#privilege escalation#Linux file permissions#etc/passwd#UID/GID
Full PT0-003 PracticeBrowse All PT0-003 Questions