New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA PT0-003 Exam - Topic 3 Question 31 Discussion

Actual exam question for CompTIA's PT0-003 exam
Question #: 31
Topic #: 3
[All PT0-003 Questions]

[Attacks and Exploits]

A penetration tester is evaluating a SCADA system. The tester receives local access to a workstation that is running a single application. While navigating through the application, the tester opens a terminal window and gains access to the underlying operating system. Which of the following attacks is the tester performing?

Show Suggested Answer Hide Answer
Suggested Answer: A

A kiosk escape involves breaking out of a restricted environment, such as a kiosk or a single application interface, to access the underlying operating system. Here's why option A is correct:

Kiosk Escape: This attack targets environments where user access is intentionally limited, such as a kiosk or a dedicated application. The goal is to break out of these restrictions and gain access to the full operating system.

Arbitrary Code Execution: This involves running unauthorized code on the system, but the scenario described is more about escaping a restricted environment.

Process Hollowing: This technique involves injecting code into a legitimate process, making it appear benign while executing malicious activities.

Library Injection: This involves injecting malicious code into a running process by loading a malicious library, which is not the focus in this scenario.

Reference from Pentest:

Forge HTB: Demonstrates techniques to escape restricted environments and gain broader access to the system.

Horizontall HTB: Shows methods to break out of limited access environments, aligning with the concept of kiosk escape.

Conclusion:

Option A, Kiosk escape, accurately describes the type of attack where a tester breaks out of a restricted environment to access the underlying operating system.


Contribute your Thoughts:

0/2000 characters
Corinne
16 hours ago
Lol, these answers are a mess. Arbitrary code execution is the only one that makes sense here. Gotta love these penetration testing questions.
upvoted 0 times
...
Lelia
6 days ago
Haha, library injection? What is this, a coding challenge? Arbitrary code execution is the way to go, no doubt.
upvoted 0 times
...
Kristin
11 days ago
Process hollowing? Nah, that's too complex for a simple SCADA system. Library injection is where it's at, my dude.
upvoted 0 times
...
Reta
16 days ago
Kiosk escape? Really? That's so 2010. This tester is clearly going for the big leagues with arbitrary code execution.
upvoted 0 times
...
Whitley
21 days ago
B) Arbitrary code execution is the correct answer. The tester has gained access to the underlying OS, which is a clear indication of arbitrary code execution.
upvoted 0 times
...
Yen
27 days ago
I lean towards library injection, but I can't recall the specifics of how that would apply in this scenario.
upvoted 0 times
...
Rickie
1 month ago
This feels similar to a practice question we did on process hollowing, but I don't think that's the right answer here.
upvoted 0 times
...
Pearlie
1 month ago
I'm not entirely sure, but I remember something about arbitrary code execution being related to gaining control over the system.
upvoted 0 times
...
Ilene
1 month ago
I think this might be a kiosk escape since the tester is getting access to the OS from a single application.
upvoted 0 times
...
Julie
2 months ago
I feel like I've seen a similar question before. Let me try to break this down step-by-step. The tester has local access, opened a terminal, and gained access to the underlying OS. That sounds like they're escaping the constraints of the application, so I'm going to go with Kiosk escape.
upvoted 0 times
...
Salena
2 months ago
Hmm, process hollowing and library injection both involve modifying the running process in some way. Since the tester was able to access the OS, those might be more relevant here. I'll need to think through the details of each one to decide.
upvoted 0 times
...
Marta
2 months ago
I'm a bit confused here. Gaining access to the underlying OS from within an application could also potentially allow for arbitrary code execution, right? I'm not sure if that's the best answer though.
upvoted 0 times
...
Farrah
2 months ago
I agree, but what about A) Kiosk escape? It seems relevant too.
upvoted 0 times
...
Ines
2 months ago
This feels tricky. I think it's B) Arbitrary code execution.
upvoted 0 times
...
Corinne
3 months ago
Okay, let's see. The tester has local access to a workstation and is able to open a terminal window and access the underlying OS. That sounds like they're escaping the constraints of the application, so I'm thinking Kiosk escape might be the right answer.
upvoted 0 times
...
Keith
3 months ago
Hmm, this seems like a tricky one. I'll need to think carefully about the different types of attacks and how they might apply to this scenario.
upvoted 0 times
Jani
2 months ago
This is definitely a tricky scenario.
upvoted 0 times
...
Skye
3 months ago
Process hollowing sounds plausible too.
upvoted 0 times
...
Fallon
3 months ago
Library injection could be a possibility as well.
upvoted 0 times
...
...

Save Cancel