A tester obtains access to an endpoint subnet and wants to move laterally in the network. Given the following output:
kotlin
Copy code
Nmap scan report for some_host
Host is up (0.01 latency).
PORT STATE SERVICE
445/tcp open microsoft-ds
Host script results: smb2-security-mode: Message signing disabled
Which of the following command and attack methods is the most appropriate for reducing the chances of being detected?
Explanation of the Correct Option:
A (responder and ntlmrelayx.py):
Responder is a tool for intercepting and relaying NTLM authentication requests.
Since SMB signing is disabled, ntlmrelayx.py can relay authentication requests and escalate privileges to move laterally without directly brute-forcing credentials, which is stealthier.
Why Not Other Options?
B: Exploiting MS17-010 (psexec) is noisy and likely to trigger alerts.
C: Brute-forcing credentials with Hydra is highly detectable due to the volume of failed login attempts.
D: Nmap scripts like smb-brute.nse are useful for enumeration but involve brute-force methods that increase detection risk.
CompTIA Pentest+ Reference:
Domain 3.0 (Attacks and Exploits)
Tegan
3 months agoLamonica
3 months agoOllie
3 months agoJill
4 months agoJennie
4 months agoDenise
4 months agoLouvenia
4 months agoHerminia
4 months agoHoward
5 months agoShaunna
5 months agoLynette
5 months agoDorinda
5 months agoAnnmarie
5 months agoErick
5 months agoWerner
1 year agoHeidy
1 year agoSharika
1 year agoVerda
1 year agoTawanna
1 year agoStephanie
1 year agoKattie
1 year agoJovita
1 year agoBrandee
1 year agoLynsey
1 year agoOmer
1 year agoGlenn
1 year agoDierdre
1 year ago