[Tools and Code Analysis] A penetration tester launches an attack against company employees. The tester clones the company's intranet login page and sends the link via email to all employees. Which of the following best describes the objective and tool selected by the tester to perform this activity?
[Information Gathering and Vulnerability Scanning] Which of the following could be used to enhance the quality and reliability of a vulnerability scan report?
[Tools and Code Analysis] During an assessment, a penetration tester gains access to one of the internal hosts. Given the following command: schtasks /create /sc onlogon /tn "Windows Update" /tr "cmd.exe /c reverse_shell.exe" Which of the following is the penetration tester trying to do with this code?
[Attacks and Exploits] During an internal penetration test, a tester compromises a Windows OS -based endpoint and bypasses the defensive mechanisms. The tester also discovers that the endpoint is part of an Active Directory (AD) local domain. The tester’s main goal is to leverage credentials to authenticate into other systems within the Active Directory environment. Which of the following steps should the tester take to complete the goal?
During a security assessment, a penetration tester captures plaintext login credentials on the communication between a user and an authentication system. The tester wants to use this information for further unauthorized access. Which of the following tools is the tester using?
[Attacks and Exploits] During a security assessment, a penetration tester gains access to an internal server and manipulates some data to hide its presence. Which of the following is the best way for the penetration tester to hide the activities performed?