Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-89 Topic 5 Question 73 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 73
Topic #: 5
[All 212-89 Questions]

John is a professional hacker who is performing an attack on the target organization where he tries to redirect the connection between the IP address and its target server such that when the users type in the Internet address, it redirects them to a rogue website that resembles the original website. He tries this attack using cache poisoning technique. Identify the type of attack John is performing on the target organization.

Show Suggested Answer Hide Answer
Suggested Answer: C

WMIC (Windows Management Instrumentation Command-line) is a command-line tool that provides a unified interface for Windows management tasks, including the collection of system information. It allows administrators and forensic investigators to query the live system for information about running services, their process IDs, start modes, states, and statuses, among other data. The use of WMIC is particularly valuable in incident response scenarios for gathering volatile information from a system without having to install additional software, which might alter the state of the system being investigated. By executing specific WMIC commands, Clark can extract detailed information about the services running on a system at the time of the investigation, making it an essential tool for collecting volatile data in a forensically sound manner.


Contribute your Thoughts:

Judy
13 days ago
Wait, is John the good guy or the bad guy here? I can never keep track of these hacking scenarios. Anyway, the answer is definitely Pharming, unless John is playing some sort of 4D chess with us.
upvoted 0 times
...
Royce
14 days ago
Haha, I bet John is the 'professional hacker' we all wish we could be. But in all seriousness, this is clearly a Pharming attack, and I'm glad I remembered that from the study materials.
upvoted 0 times
Mitsue
2 days ago
Pharming attack
upvoted 0 times
...
...
Beula
25 days ago
Ah, I was thinking it might be Skimming at first, but the description of redirecting users to a rogue website sounds more like Pharming. Good catch on the cache poisoning part!
upvoted 0 times
Pearlie
3 days ago
B) Pharming
upvoted 0 times
...
Mendy
19 days ago
A) War driving
upvoted 0 times
...
...
Clay
2 months ago
I agree with both of you. Pharming is the correct answer because John is manipulating the DNS cache to redirect users to a malicious website.
upvoted 0 times
...
Nida
2 months ago
This definitely sounds like Pharming to me. Cache poisoning is a classic Pharming attack technique, where the attacker redirects users to a fake website instead of the real one.
upvoted 0 times
Nobuko
12 days ago
Pharming is a serious threat to organizations as it can lead to sensitive information being stolen by attackers.
upvoted 0 times
...
Pa
13 days ago
I agree, John is definitely performing a Pharming attack by using cache poisoning to redirect users to a fake website.
upvoted 0 times
...
...
Miesha
2 months ago
I think John is definitely performing a Pharming attack. It's a common technique used by hackers to redirect users to fake websites.
upvoted 0 times
...
Shannon
2 months ago
B) Pharming - John is redirecting users to a rogue website that resembles the original one.
upvoted 0 times
...

Save Cancel