New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GPEN Exam - Topic 9 Question 17 Discussion

Actual exam question for GIAC's GPEN exam
Question #: 17
Topic #: 9
[All GPEN Questions]

You want to perform an active session hijack against Secure Inc. You have found a target that allows Telnet session. You have also searched an active session due to the high level of traffic on the network. What should you do next?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Franchesca
4 months ago
D is not relevant here, stick to the basics with A or B.
upvoted 0 times
...
Youlanda
4 months ago
Wait, can you really hijack a session just like that? Sounds too easy.
upvoted 0 times
...
Tresa
4 months ago
C is a waste of time, Telnet passwords are usually weak anyway.
upvoted 0 times
...
Zana
4 months ago
B seems risky, but could work if you know the protocol.
upvoted 0 times
...
Moira
5 months ago
Definitely go with A, sniffing traffic is key.
upvoted 0 times
...
William
5 months ago
Changing the MAC address with macoff seems a bit off-topic for this scenario. I don't think that's what we should focus on right now.
upvoted 0 times
...
Eliz
5 months ago
I'm leaning towards using brutus to crack the telnet password, but I feel like there might be a more stealthy approach.
upvoted 0 times
...
Herschel
5 months ago
I remember practicing a similar question where guessing sequence numbers was the right move. Maybe that's what I should consider here?
upvoted 0 times
...
Janna
5 months ago
I think using a sniffer to listen to network traffic makes sense, but I'm not entirely sure if that's the best first step.
upvoted 0 times
...
Minna
5 months ago
I'm a bit confused on the difference between cloning data and creating a copy using CREATE TABLE AS. I'll need to review those options carefully.
upvoted 0 times
...
Shenika
5 months ago
Hmm, I'm not totally sure about this one. I guess it could be making sure the data collected is accurate, but I'm not 100% confident on that. I'll have to think it through a bit more.
upvoted 0 times
...
Octavio
5 months ago
Hmm, this is a tricky one. I'm not totally sure about the differences between the options, but I think implementing microsegmentation or using VLANs could be good ways to isolate the infected systems and prevent the malware from spreading.
upvoted 0 times
...
Pamella
5 months ago
This is a good question to test our understanding of business architecture. I believe the key benefit is enabling the organization to be more agile and responsive to changing business needs, so I'll go with D.
upvoted 0 times
...

Save Cancel