PT0-003 · Question #85
PT0-003 Question #85: Real Exam Question with Answer & Explanation
The correct answer is A: Unquoted service path. The provided output reveals a common vulnerability in Windows services known as an unquoted service path. When the service executable path is not enclosed in quotes and contains spaces, Windows may incorrectly interpret the spaces, potentially leading to the execution of unintend
Question
A penetration tester enters a command into the shell and receives the following output: C:\Users\UserX\Desktop>vmic service get name, pathname, displayname, startmode | findstr /i auto | findstr /i /v |C:\\Windows\\" I findstr /i /v"" VulnerableService Some Vulnerable Service C:\Program Files\A Subfolder\B Subfolder\SomeExecutable.exe Automatic Which of the following types of vulnerabilities does this system contain?
Options
- AUnquoted service path
- BWritable services
- CClear text credentials
- DInsecure file/folder permissions
Explanation
The provided output reveals a common vulnerability in Windows services known as an unquoted service path. When the service executable path is not enclosed in quotes and contains spaces, Windows may incorrectly interpret the spaces, potentially leading to the execution of unintended The command vmic service get name, pathname, displayname, startmode | findstr /i auto | findstr /i /v "C:\Windows\" | findstr /i /v "" filters services that are set to start automatically and are not located in the Windows directory. Output Interpretation: The output shows a service with a path C:\Program Files\A Subfolder\B Subfolder\SomeExecutable.exe which is not quoted. If a malicious user places an executable in C:\Program.exe, C:\Program Files\A.exe, or similar, it might get executed instead.
Topics
Community Discussion
No community discussion yet for this question.