Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-003 Topic 3 Question 16 Discussion

Actual exam question for CompTIA's PT0-003 exam
Question #: 16
Topic #: 3
[All PT0-003 Questions]

A penetration tester wants to maintain access to a compromised system after a reboot. Which of the following techniques would be best for the tester to use?

Show Suggested Answer Hide Answer
Suggested Answer: A

Capabilities: BeEF is equipped with modules to create CSRF attacks, capture session tokens, and gather sensitive information from the target user's browser session.

Drawbacks: While useful for reconnaissance, Maltego is not designed for exploiting web vulnerabilities like CSRF.

Metasploit (Option C):

Capabilities: While Metasploit can exploit some web vulnerabilities, it is not specifically tailored for CSRF attacks as effectively as BeEF.

Drawbacks: It does not provide capabilities for exploiting CSRF vulnerabilities.

Conclusion: The Browser Exploitation Framework (BeEF) is the most suitable tool for leveraging a CSRF vulnerability to gather sensitive details from an application's end users. It is specifically designed for browser-based exploitation, making it the best choice for this task.


Maltego (Option B):

theHarvester (Option D):

Contribute your Thoughts:

Portia
24 days ago
Scheduled task? Sounds like a real snooze-fest. Where's the excitement in that?
upvoted 0 times
...
Gail
1 months ago
Process injection? That's like sneaking into a party through the kitchen door. Subtle, I like it.
upvoted 0 times
It's definitely a sneaky way to stay in the system without being detected.
upvoted 0 times
...
Dell
3 days ago
Yes, process injection is a great technique for maintaining access after a reboot.
upvoted 0 times
...
...
Wava
1 months ago
Credential-dumping, huh? I'm not sure I want to go down that rabbit hole, but it could be juicy.
upvoted 0 times
Maybe setting up a persistence mechanism could work.
upvoted 0 times
...
Chauncey
8 days ago
I think using a backdoor would be the best option.
upvoted 0 times
...
...
Timmy
1 months ago
Ooh, a reverse shell sounds fun! I can practically hear the system whispering 'hack me, hack me' already.
upvoted 0 times
...
Cory
2 months ago
Creating a scheduled task seems like the way to go. It'll give me persistent access even after a reboot.
upvoted 0 times
Maryann
22 days ago
Yes, creating a scheduled task will ensure persistent access to the compromised system.
upvoted 0 times
...
Tamar
1 months ago
Scheduled task is a good choice for maintaining access after a reboot.
upvoted 0 times
...
...
Ellsworth
2 months ago
I think creating a scheduled task could also work to maintain access after a reboot.
upvoted 0 times
...
Queenie
2 months ago
I agree with Sheldon, a reverse shell would allow for persistent access.
upvoted 0 times
...
Sheldon
2 months ago
I think establishing a reverse shell would be the best option.
upvoted 0 times
...

Save Cancel