Practice Free PT0-003 Exam Online Questions
Which of the following elements in a lock should be aligned to a specific level to allow the key cylinder to turn?
- A . Latches
- B . Pins
- C . Shackle
- D . Plug
B
Explanation:
In a pin tumbler lock, the key interacts with a series of pins within the lock cylinder.
Here’s a detailed breakdown:
Components of a Pin Tumbler Lock:
Key Pins: These are the pins that the key directly interacts with. The cuts on the key align these pins.
Driver Pins: These are pushed by the springs and sit between the key pins and the springs.
Springs: These apply pressure to the driver pins.
Plug: This is the part of the lock that the key is inserted into and turns when the correct key is used.
Cylinder: The housing for the plug and the pins.
Operation:
When the correct key is inserted, the key pins are pushed up by the key’s cuts to align with the shear line (the gap between the plug and the cylinder).
The alignment of the pins at the shear line allows the plug to turn, thereby operating the lock.
Why Pins Are the Correct Answer
The correct key aligns the key pins and driver pins to the shear line, allowing the plug to turn. If any pin is not correctly aligned, the lock will not open. Illustration in Lock Picking:
Lock picking involves manipulating the pins so they align at the shear line without the key. This demonstrates the critical role of pins in the functioning of the lock.
Which of the following techniques is the best way to avoid detection by data loss prevention tools?
- A . Encoding
- B . Compression
- C . Encryption
- D . Obfuscation
A
Explanation:
Encoding to Evade DLP:
Encoding (e.g., Base64) transforms data into a format that may bypass data loss prevention (DLP) tools.
DLP solutions often look for specific patterns (e.g., sensitive keywords, file headers) and may not recognize encoded data.
Why Not Other Options?
B (Compression): Compression reduces file size but does not typically bypass DLP detection mechanisms.
C (Encryption): Encrypted data is detectable by DLP tools, though its contents may not be readable.
D (Obfuscation): While obfuscation hides intent, encoding is more effective for bypassing automated detection.
CompTIA Pentest+
Reference: Domain 3.0 (Attacks and Exploits)
A penetration tester is performing network reconnaissance. The tester wants to gather information about the network without causing detection mechanisms to flag the reconnaissance activities.
Which of the following techniques should the tester use?
- A . Sniffing
- B . Banner grabbing
- C . TCP/UDP scanning
- D . Ping sweeps
A
Explanation:
To gather information about the network without causing detection mechanisms to flag the reconnaissance activities, the penetration tester should use sniffing.
Sniffing:
Definition: Sniffing involves capturing and analyzing network traffic passing through the network. It is a passive reconnaissance technique that does not generate detectable traffic on the network.
Tools: Tools like Wireshark and tcpdump are commonly used for sniffing. They capture packets and provide insights into network communications, protocols in use, devices, and potential vulnerabilities.
Advantages:
Stealthy: Since sniffing is passive, it does not generate additional traffic that could be detected by intrusion detection systems (IDS) or other monitoring tools.
Information Gathered: Sniffing can reveal IP addresses, MAC addresses, open ports, running services, and potentially sensitive information transmitted in plaintext.
Comparison with Other Techniques:
Banner Grabbing: Active technique that sends requests to a target service to gather information from banners, which can be detected.
TCP/UDP Scanning: Active technique that sends packets to probe open ports and services, easily detected by network monitoring tools.
Ping Sweeps: Active technique that sends ICMP echo requests to determine live hosts, also detectable by network monitoring.
Pentest
Reference: Reconnaissance Phase: Using passive techniques like sniffing during the initial reconnaissance phase helps gather information without alerting the target.
Network Analysis: Understanding the network topology and identifying key assets and vulnerabilities without generating traffic that could trigger alarms.
By using sniffing, the penetration tester can gather detailed information about the network in a stealthy manner, minimizing the risk of detection.
Which of the following tasks would ensure the key outputs from a penetration test are not lost as part of the cleanup and restoration activities?
- A . Preserving artifacts
- B . Reverting configuration changes
- C . Keeping chain of custody
- D . Exporting credential data
A
Explanation:
Preserving artifacts ensures that key outputs from the penetration test, such as logs, screenshots, captured data, and any generated reports, are retained for analysis, reporting, and future reference. Importance of Preserving Artifacts:
Documentation: Provides evidence of the test activities and findings.
Verification: Allows for verification and validation of the test results.
Reporting: Ensures that all critical data is available for the final report.
Types of Artifacts:
Logs: Capture details of the tools used, commands executed, and their outputs.
Screenshots: Visual evidence of the steps taken and findings.
Captured Data: Includes network captures, extracted credentials, and other sensitive information.
Reports: Interim and final reports summarizing the findings and recommendations.
Best Practices:
Secure Storage: Ensure artifacts are stored securely to prevent unauthorized access.
Backups: Create backups of critical artifacts to avoid data loss.
Documentation: Maintain detailed documentation of all artifacts for future reference.
Reference from Pentesting Literature:
Preserving artifacts is a standard practice emphasized in penetration testing methodologies to ensure comprehensive documentation and reporting of the test.
HTB write-ups often include references to preserved artifacts to support the findings and
conclusions.
Step-by-Step Explanation Reference: Penetration Testing – A Hands-on Introduction to Hacking HTB Official Writeups
A tester gains initial access to a server and needs to enumerate all corporate domain DNS records.
Which of the following commands should the tester use?
- A . dig +short A AAAA local.domain
- B . nslookup local.domain
- C . dig axfr @local.dns.server
- D . nslookup -server local.dns.server local.domain *
C
Explanation:
La opción C, dig axfr @local.dns.server, realiza una transferencia de zona DNS (Zone Transfer). Si el servidor DNS está mal configurado y permite este tipo de solicitudes, el atacante puede obtener todos los registros DNS del dominio interno.
La opción A muestra solo registros A/AAAA. La B no hace enumeración completa. La D no es válida como sintaxis.
Referencia: PT0-003 Objective 3.3 C Perform domain enumeration using dig and DNS zone transfer techniques.
During an internal penetration test, a tester compromises a Windows OS-based endpoint and bypasses the defensive mechanisms. The tester also discovers that the endpoint is part of an Active Directory (AD) local domain.
The tester’s main goal is to leverage credentials to authenticate into other systems within the Active Directory environment.
Which of the following steps should the tester take to complete the goal?
- A . Use Mimikatz to collect information about the accounts and try to authenticate in other systems
- B . Use Hashcat to crack a password for the local user on the compromised endpoint
- C . Use Evil-WinRM to access other systems in the network within the endpoint credentials
- D . Use Metasploit to create and execute a payload and try to upload the payload into other systems
A
Explanation:
Since the tester has compromised a Windows machine and bypassed security, the best next step is to extract credentials from memory to move laterally within Active Directory.
Option A (Mimikatz) ✅ : Correct.
Mimikatz extracts hashed credentials, plaintext passwords, and Kerberos tickets from memory. Attackers use Pass-the-Hash (PtH) or Pass-the-Ticket (PtT) to authenticate on other systems without cracking passwords.
Option B (Hashcat) ❌ : Cracking passwords takes time and is not necessary if Mimikatz provides reusable credentials.
Option C (Evil-WinRM) ❌ : Evil-WinRM is useful for remotely executing commands, but without valid credentials, it won’t work.
Option D (Metasploit) ❌ : Metasploit payloads may be useful for initial exploitation, but credential dumping is a better next step.
Reference: CompTIA PenTest+ PT0-003 Official Guide C Credential Dumping & Lateral Movement
During an internal penetration test, a tester compromises a Windows OS-based endpoint and bypasses the defensive mechanisms. The tester also discovers that the endpoint is part of an Active Directory (AD) local domain.
The tester’s main goal is to leverage credentials to authenticate into other systems within the Active Directory environment.
Which of the following steps should the tester take to complete the goal?
- A . Use Mimikatz to collect information about the accounts and try to authenticate in other systems
- B . Use Hashcat to crack a password for the local user on the compromised endpoint
- C . Use Evil-WinRM to access other systems in the network within the endpoint credentials
- D . Use Metasploit to create and execute a payload and try to upload the payload into other systems
A
Explanation:
Since the tester has compromised a Windows machine and bypassed security, the best next step is to extract credentials from memory to move laterally within Active Directory.
Option A (Mimikatz) ✅ : Correct.
Mimikatz extracts hashed credentials, plaintext passwords, and Kerberos tickets from memory. Attackers use Pass-the-Hash (PtH) or Pass-the-Ticket (PtT) to authenticate on other systems without cracking passwords.
Option B (Hashcat) ❌ : Cracking passwords takes time and is not necessary if Mimikatz provides reusable credentials.
Option C (Evil-WinRM) ❌ : Evil-WinRM is useful for remotely executing commands, but without valid credentials, it won’t work.
Option D (Metasploit) ❌ : Metasploit payloads may be useful for initial exploitation, but credential dumping is a better next step.
Reference: CompTIA PenTest+ PT0-003 Official Guide C Credential Dumping & Lateral Movement
A penetration tester uses a reverse shell to maintain connectivity to a target network. During the
final phase of the exercise, the penetration tester removes the reverse shell.
Which of the following is an example of these activities?
- A . Removing persistence mechanisms
- B . Uninstalling tools
- C . Preserving artifacts
- D . Reverting configuration changes
A
Explanation:
Comprehensive and Detailed
A reverse shell that is left on a target to maintain access is a form of persistence/backdoor. The action described ― removing the reverse shell at the end of the engagement ― is specifically the removal of a persistence mechanism. Post-engagement cleanup requires removal of any artifacts that provide continued access (web shells, scheduled tasks, reverse shells, cron jobs, created accounts, etc.) so the environment is returned to its pre-test state and to prevent later compromise.
Why not the others:
B (Uninstalling tools): Removing tools is also a cleanup activity, but the question explicitly references removing the reverse shell (persistence).
C (Preserving artifacts): Preserving artifacts is the opposite (saving logs/evidence) for incident response ― not removing access.
D (Reverting configuration changes): Important, but the best single match for removing a reverse shell is “removing persistence mechanisms.”
PT0-003 mapping: Domain 5 ― post-engagement cleanup and returning environment to baseline.
During a security assessment for an internal corporate network, a penetration tester wants to gain unauthorized access to internal resources by executing an attack that uses software to disguise itself as legitimate software.
Which of the following host-based attacks should the tester use?
- A . On-path
- B . Logic bomb
- C . Rootkit
- D . Buffer overflow
C
Explanation:
A rootkit is a type of malicious software designed to provide an attacker with unauthorized access to a computer system while concealing its presence. Rootkits achieve this by modifying the host’s operating system or other software to hide their existence, allowing the attacker to maintain control over the system without detection.
Definition and Purpose:
Rootkits are primarily used to gain and maintain root access (administrative privileges) on a system.
They disguise themselves as legitimate software or integrate deeply into the operating system to avoid detection.
Mechanisms of Action:
Kernel Mode Rootkits: These operate at the kernel level, which is the core of the operating system, making them very powerful and hard to detect.
User Mode Rootkits: These run in the same space as user applications, intercepting and altering standard system API calls to hide their presence.
Bootkits: These infect the Master Boot Record (MBR) or Volume Boot Record (VBR) and load before the operating system, making them extremely difficult to detect and remove.
Detection and Prevention:
Detection Tools: Tools like RootkitRevealer, Chkrootkit, and rkhunter can help in identifying rootkits. Prevention: Regular system updates, use of strong antivirus and anti-malware solutions, and integrity checking tools like Tripwire can help in preventing rootkit infections. Real-World Examples:
Sony BMG Rootkit: In 2005, Sony BMG included a rootkit in their digital rights management (DRM) software on music CDs. The rootkit hid files and processes, leading to a major scandal when it was discovered.
Stuxnet: This sophisticated worm included a rootkit component to hide its presence on infected systems, making it one of the most infamous examples of rootkit use in a cyber attack. Reference from Pentesting Literature:
In "Penetration Testing – A Hands-on Introduction to Hacking" by Georgia Weidman, rootkits are discussed in the context of post-exploitation, where maintaining access to the compromised system is crucial.
Various HTB write-ups, such as the analysis of complex attacks involving multiple stages of exploitation, often highlight the use of rootkits in maintaining persistent access. Step-by-Step Explanation Reference: Penetration Testing – A Hands-on Introduction to Hacking HTB Official Writeups on sophisticated attacks
During a security assessment for an internal corporate network, a penetration tester wants to gain unauthorized access to internal resources by executing an attack that uses software to disguise itself as legitimate software.
Which of the following host-based attacks should the tester use?
- A . On-path
- B . Logic bomb
- C . Rootkit
- D . Buffer overflow
C
Explanation:
A rootkit is a type of malicious software designed to provide an attacker with unauthorized access to a computer system while concealing its presence. Rootkits achieve this by modifying the host’s operating system or other software to hide their existence, allowing the attacker to maintain control over the system without detection.
Definition and Purpose:
Rootkits are primarily used to gain and maintain root access (administrative privileges) on a system.
They disguise themselves as legitimate software or integrate deeply into the operating system to avoid detection.
Mechanisms of Action:
Kernel Mode Rootkits: These operate at the kernel level, which is the core of the operating system, making them very powerful and hard to detect.
User Mode Rootkits: These run in the same space as user applications, intercepting and altering standard system API calls to hide their presence.
Bootkits: These infect the Master Boot Record (MBR) or Volume Boot Record (VBR) and load before the operating system, making them extremely difficult to detect and remove.
Detection and Prevention:
Detection Tools: Tools like RootkitRevealer, Chkrootkit, and rkhunter can help in identifying rootkits. Prevention: Regular system updates, use of strong antivirus and anti-malware solutions, and integrity checking tools like Tripwire can help in preventing rootkit infections. Real-World Examples:
Sony BMG Rootkit: In 2005, Sony BMG included a rootkit in their digital rights management (DRM) software on music CDs. The rootkit hid files and processes, leading to a major scandal when it was discovered.
Stuxnet: This sophisticated worm included a rootkit component to hide its presence on infected systems, making it one of the most infamous examples of rootkit use in a cyber attack. Reference from Pentesting Literature:
In "Penetration Testing – A Hands-on Introduction to Hacking" by Georgia Weidman, rootkits are discussed in the context of post-exploitation, where maintaining access to the compromised system is crucial.
Various HTB write-ups, such as the analysis of complex attacks involving multiple stages of exploitation, often highlight the use of rootkits in maintaining persistent access. Step-by-Step Explanation Reference: Penetration Testing – A Hands-on Introduction to Hacking HTB Official Writeups on sophisticated attacks
