Which of the following is a local host vulnerability that the attacker is exploiting?

A penetration tester executes the following commands:

C:>%userprofile%jtr.exe

This program has been blocked by group policy

C:> accesschk.exe -w -s -q -u Users C:Windows

rw C:WindowsTracing

C:>copy %userprofile%jtr.exe C:WindowsTracing

C:WindowsTracingjtr.exe

jtr version 3.2…

jtr>

Which of the following is a local host vulnerability that the attacker is exploiting?
A . Insecure file permissions
B . Application Whitelisting
C . Shell escape
D . Writable service

Answer: A

Explanation:

References https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/#john-the-ripper—jtr

Latest PT0-001 Dumps Valid Version with 248 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments