New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA PT0-003 Exam - Topic 3 Question 28 Discussion

Actual exam question for CompTIA's PT0-003 exam
Question #: 28
Topic #: 3
[All PT0-003 Questions]

During a security assessment, a penetration tester uses a tool to capture plaintext log-in credentials on the communication between a user and an authentication system. The tester wants to use this information for further unauthorized access. Which of the following tools is the tester using?

Show Suggested Answer Hide Answer
Suggested Answer: B

Wireshark is a network packet analyzer used to capture and analyze network traffic in real-time. During a penetration test, it is often used to inspect unencrypted communication to extract sensitive information like plaintext login credentials. Here's how it works:

Packet Capturing:Wireshark captures the network packets transmitted over a network interface. If a user logs in through an insecure communication protocol (e.g., HTTP, FTP, or Telnet), the credentials are transmitted in plaintext.

Traffic Filtering:Using filters (e.g., http, tcp.port == 21), the tester narrows down the relevant traffic to locate the login request and response packets.

Sensitive Data Extraction:Analyzing the captured packets reveals plaintext credentials in the data payload, such as in HTTP POST requests.

Exploit the Information:After extracting the plaintext credentials, the tester can attempt unauthorized access to resources using these credentials.

CompTIA Pentest+ Reference:

Domain 1.0 (Planning and Scoping)

Domain 2.0 (Information Gathering and Vulnerability Identification)

Wireshark Usage Guide


Contribute your Thoughts:

0/2000 characters
Tyra
2 months ago
Wait, are we sure it’s not Metasploit? Seems odd.
upvoted 0 times
...
Chanel
2 months ago
ZAP is cool, but not for this specific task.
upvoted 0 times
...
Leota
2 months ago
I think it's Burp Suite, it’s great for web apps!
upvoted 0 times
...
Lai
2 months ago
Definitely Wireshark, it captures network traffic.
upvoted 0 times
...
Gilbert
3 months ago
I thought all these tools could do that, but Wireshark feels right.
upvoted 0 times
...
Bo
3 months ago
I’m leaning towards Zed Attack Proxy since it’s designed for web applications, but I could see how Burp Suite might fit too.
upvoted 0 times
...
Launa
3 months ago
I have a vague memory of using Metasploit for exploitation, but I don't think it captures credentials directly like the other tools.
upvoted 0 times
...
Caitlin
4 months ago
I remember practicing with Burp Suite and ZAP, but I feel like Wireshark is more focused on network traffic analysis.
upvoted 0 times
...
Leonor
4 months ago
I think the tool used for capturing plaintext credentials is likely Wireshark, but I'm not entirely sure if it can also be used for that purpose in all scenarios.
upvoted 0 times
...
Ryan
4 months ago
Metasploit is a powerful penetration testing framework, but I don't think it's the right tool for this scenario. I'm leaning towards Wireshark or Burp Suite as the most likely options.
upvoted 0 times
...
Danica
4 months ago
I think the answer is Burp Suite. It's a comprehensive web application security testing tool that can be used to capture and analyze plaintext credentials in web traffic.
upvoted 0 times
...
Cherry
4 months ago
Zed Attack Proxy (ZAP) is a good guess too. It's an open-source web application security scanner that can be used to intercept and analyze web traffic.
upvoted 0 times
...
Carmelina
5 months ago
Hmm, I'm a bit unsure on this one. Could it also be Burp Suite? That's a popular web application security testing tool that can intercept and modify web traffic.
upvoted 0 times
...
Terrilyn
5 months ago
I'm pretty sure this is Wireshark. It's a network protocol analyzer that can capture and inspect network traffic, including plaintext credentials.
upvoted 0 times
...
Colette
5 months ago
Hmm, I'd say the tester is using Burp Suite. That's the ultimate web app hacking toolkit, perfect for this kind of man-in-the-middle attack.
upvoted 0 times
...
Joni
5 months ago
Aha, I bet the answer is B. Wireshark. That's the go-to tool for intercepting traffic and capturing login details. Classic penetration testing move.
upvoted 0 times
Lorean
1 month ago
Metasploit is powerful, but not for capturing credentials like this.
upvoted 0 times
...
Shonda
2 months ago
Burp Suite is great too, but for traffic, Wireshark wins.
upvoted 0 times
...
Evangelina
2 months ago
Yeah, it captures packets perfectly.
upvoted 0 times
...
Margarita
3 months ago
I agree, Wireshark is definitely the right choice.
upvoted 0 times
...
...
Ezekiel
6 months ago
Woah, looks like the tester is using Wireshark to sniff those juicy credentials! Gotta love that network packet snooping action.
upvoted 0 times
Leonie
5 months ago
Yeah, it's great for analyzing packets and finding vulnerabilities.
upvoted 0 times
...
Lawana
5 months ago
I heard Wireshark is a powerful tool for capturing network traffic.
upvoted 0 times
...
...

Save Cancel