Exam PT0-002 All QuestionsBrowse all questions from this exam
Question 18

An Nmap scan shows open ports on web servers and databases. A penetration tester decides to run WPScan and SQLmap to identify vulnerabilities and additional information about those systems.

Which of the following is the penetration tester trying to accomplish?

    Correct Answer: B

    The primary objective of running WPScan and SQLmap is to identify vulnerabilities within the specific applications and systems they target—in this case, WordPress sites and databases. A penetration tester uses these specialized tools to uncover potential security weaknesses and gather additional information about the systems being tested. This process is part of a broader effort to identify as many vulnerabilities as possible within the environment, focusing on the technologies that have been identified as having open ports. Therefore, the penetration tester is trying to identify all the vulnerabilities in the environment related to those technologies.

Discussion
masso435Option: C

I think the wording is tricky. Yes both applications scan for vulnerabilities but not all vulnerabilities. This indicates it will find vulnerability outside of WordPress and SQL based on the wording alone.

shakevia463

Doesnt mean hes not attempting to find all vulnerabilites.... he is trying to find them.

dcyberguyOption: B

Identifying Vulnerabilities should be the clear choice

ProNerdOption: C

SQLmap and WPScan are going to identify vulnerabilities in the DBs and websites. Are they going to identify server OS, hypervisor, workstation, firewall, storage system, etc. vulnerabilities? No. So it isn't trying to find ALL vulnerabilities, it's limiting the scope. The answer is C.

isaphiltrick

I agree with C - Limit invasiveness based on scope. ProNerd's explanation makes complete sense. The question is about a pentester specifically targeting vulnerabilities with websites and databases so how can he identify all vulnerabilities in the environment? The answer B would be correct if it specifically said "Identify all the vulnerabilities with websites and SQL databases in the environment."

Ginzo

This is a great explanation of the idea here. If the PenTester wanted to find all vulnerabilities, then they wouldn't use just those tools. Great work here.

YokotaOption: C

The penetration tester uses these tools to find vulnerabilities within the defined scope, which might cover WordPress and SQL vulnerabilities, while making sure not to exceed the permitted testing boundaries

[Removed]Option: C

When a penetration tester decides to use specialized tools like WPScan (for WordPress vulnerabilities) and SQLmap (for SQL injection vulnerabilities), the primary goal is often to limit invasiveness based on the scope of the engagement. By using tools that are specifically designed for certain types of vulnerabilities, the penetration tester can focus on targeted assessments related to the known technologies in the environment. -CHatGPT

me39Option: B

The correct answer is B. "C. Limit invasiveness based on scope" adds new information that is not contained in the question. Would you choose C if it said, "C. Limit invasiveness to reduce interference with end of year reports"?

FnordyCloversOption: B

B. Identify all the vulnerabilities in the environment. By running WPScan against the web servers and SQLmap against the databases after seeing open ports, the penetration tester is likely trying to identify as many vulnerabilities as possible in those systems. This helps comprehensively enumerate the attack surface and vulnerabilities to document in the report. The goal does not seem to be uncovering criminal activity, limiting invasiveness, or maintaining confidentiality, but rather maximizing vulnerability identification. However, the penetration tester should still take care to act within agreed scope and keep findings confidential per agreement with the client.

djash22Option: B

However, considering the specificity of the tools (WPScan for WordPress vulnerabilities and SQLmap for SQL injection vulnerabilities), it would be more accurate to say the tester aims to identify specific vulnerabilities in the web servers and databases, but within the broader context, identifying vulnerabilities aligns with option B the closest.

Etc_Shadow28000Option: B

The penetration tester is trying to: B. Identify all the vulnerabilities in the environment. configurations that could be exploited for criminal activity, the primary goal of using WPScan and SQLmap is to find and identify vulnerabilities, not necessarily to uncover criminal activity. C. Limit invasiveness based on scope: • Running vulnerability scanning tools like WPScan and SQLmap might be part of the scope, but these tools can be invasive. The intent behind using these tools is to discover vulnerabilities, not necessarily to limit invasiveness.

BirdLawyerOption: C

I originally thought it was B but it seems to be that they included the nmap scan showing the specific port categories that were open as well as the word scope in the answer C. My logic is that the tester identified the scope using nmap and once he did that he then is limiting the testing to those specific ports in question thereby limiting the invasiveness of the testing overall and adhering to the scope.

BluedegardOption: B

I don't think using WPscan and SQLmap will reduce invasiveness

NickyCEEOption: B

The answer is definitely B yall. The pentester scanned the WHOLE system and only found open WEB and DATABASE ports. Now the tester is using specific tools to exploit those services. Had the tester found other open services they would use more tools. So they arent limiting invasiveness they are exploiting everything that is POSSIBLE.

deedenOption: C

Agree with C. Trying to identify all vulnerabilities would probably include DoS and Buffer Overflows which can be invasive and will probably need scanner other than WPScan and SQLmap

KeToopStudyOption: B

So considdering the fact that the nmap showed open ports only on web server and databases we can safely assume that there are no other ports open. So the use of WPScan and SQL injection leads me to belive that the pentester is going for discovery of all vulnerabilities. B should be the right answer

Skater_GraceOption: B

I think its B, as tester wants to reveal more vulnerabilities . Invasion will come after exploitation..

Meep123Option: B

Based on the wording of the questions, I find the question leaning more towards "all vulnerabilities" being more correct than "limit invasiveness". Not all answers are going to be perfect, this one seems to be "which one is more correct".

UseChatGPTOption: C

King ChatGPT says C so listen to him

581777a

ChatGPT just told me B. lol

iamtylerman

GPT-3.5 says it's C GPT-4 says it's B

KeToopStudy

ChatGPT is quite dumb actually... I used it quite often an he has a lot of issues answering these questions.

asdfg96

BUT IT MENTIONED - additional information about those systems. ChatGPT You're correct, and I appreciate the clarification. Given that the penetration tester is also seeking additional information about the systems, the goal extends beyond just identifying vulnerabilities. In that case, the most suitable option would be: B. Identify all the vulnerabilities in the environment. By utilizing tools like WPScan and SQLmap, the penetration tester aims not only to uncover vulnerabilities but also to gather additional information about the systems, such as specific vulnerabilities, configurations, or weaknesses that could potentially be exploited. This broader objective aligns with the goal of identifying all vulnerabilities present in the environment, rather than just focusing on a limited scope of assessment.