A penetration tester completes a scan and sees the following output on a host:
bash
Copy code
Nmap scan report for victim (10.10.10.10)
Host is up (0.0001s latency)
PORT STATE SERVICE
161/udp open|filtered snmp
445/tcp open microsoft-ds
3389/tcp open microsoft-ds
Running Microsoft Windows 7
OS CPE: cpe:/o:microsoft:windows_7_sp0
The tester wants to obtain shell access. Which of the following related exploits should the tester try first?
The ms17_010_eternalblue exploit is the most appropriate choice based on the scenario.
Why MS17-010 EternalBlue?
EternalBlue is a critical vulnerability in SMBv1 (port 445) affecting older versions of Windows, including Windows 7.
The exploit can be used to execute arbitrary code remotely, providing shell access to the target system.
Other Options:
A (psexec): This exploit is a post-exploitation tool that requires valid credentials to execute commands remotely.
B (ms08_067_netapi): A vulnerability targeting older Windows systems (e.g., Windows XP). It is unlikely to work on Windows 7.
D (snmp_login): This is an auxiliary module for enumerating SNMP, not gaining shell access.
CompTIA Pentest+ Reference:
Domain 2.0 (Information Gathering and Vulnerability Identification)
Domain 3.0 (Attacks and Exploits)
Maynard
4 months agoElza
4 months agoFelicidad
4 months agoZona
4 months agoBrianne
5 months agoDiego
5 months agoCecily
5 months agoDesmond
5 months agoDorothy
6 months agoKimberely
6 months agoLeota
6 months agoHan
6 months agoFreeman
6 months agoCatalina
11 months agoLatonia
9 months agoLettie
9 months agoMisty
10 months agoVelda
10 months agoMarguerita
11 months agoMoon
11 months agoTamar
10 months agoJustine
10 months agoErinn
10 months agoSerina
11 months agoFausto
10 months agoArdella
10 months agoKate
11 months agoEmeline
11 months agoShayne
12 months agoDerick
12 months agoTrina
12 months agoIsidra
10 months agoMarya
10 months agoAn
10 months agoCorrina
11 months agoDeeanna
11 months agoStephania
11 months ago