Which of the following is a local host vulnerability that the attacker is exploiting?
A penetration tester executes the following commands:
C:>%userprofile%jtr.exe
This program has been blocked by group policy
C:> accesschk.exe -w -s -q -u Users C:Windows
rw C:WindowsTracing
C:>copy %userprofile%jtr.exe C:WindowsTracing
C:WindowsTracingjtr.exe
jtr version 3.2…
jtr>
Which of the following is a local host vulnerability that the attacker is exploiting?
A . Insecure file permissions
B . Application Whitelisting
C . Shell escape
D . Writable service
Answer: A
Explanation:
References https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/#john-the-ripper—jtr
Latest PT0-001 Dumps Valid Version with 248 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments