Exam PT0-002 All QuestionsBrowse all questions from this exam
Question 213

A penetration tester is conducting a penetration test and discovers a vulnerability on a web server that is owned by the client. Exploiting the vulnerability allows the tester to open a reverse shell. Enumerating the server for privilege escalation, the tester discovers the following:

Which of the following should the penetration tester do NEXT?

    Correct Answer: C

    After discovering a vulnerability and gaining a reverse shell, the penetration tester should proceed to investigate the high numbered port connections present in the netstat output. Numerous established connections involving high numbered ports may signify active or suspicious activities that require further scrutiny. The tester's priority is to thoroughly investigate these connections to determine any additional potential vulnerabilities or malicious activities. This step is crucial before deciding on further actions such as closing the reverse shell or contacting the client. Improper investigation or premature communication with the client without understanding the full extent of the situation might lead to incomplete or inaccurate reporting.

Discussion
cy_analystOption: C

The correct next step for the penetration tester would be to investigate the high numbered port connections. These connections could potentially indicate the presence of additional services or processes running on the server, and the tester should explore them further to determine if they represent any additional vulnerabilities or potential attack vectors. It is also important for the tester to document this finding for inclusion in the final report. The tester should not close the reverse shell at this point, as it may be needed for further testing or investigation, and there is no immediate need to contact the client unless there is an imminent security threat.

TheSkyManOption: D

My biggest concern about C being the answer is the pentester shouldn't be investigating anything if it's not in the SOW or ROEs. The pentester could compromise any forensics and delay remediation; they're not apart of the company's Incident Response Team. This finding should be reported immediately to the client as a possible compromise... just like the other questions have shown.

biggydanny

I hear you but reading the question, this seems to be in scope but you do have a valid point

biggydanny

The output of the netstat command shows active connections to and from the web server. The established connections on high numbered ports (58003, 40243, and 40252) are suspicious and should be investigated further. The penetration tester should attempt to identify the processes associated with those connections to determine if they are legitimate or if they represent an ongoing attack. Closing the reverse shell or contacting the client should not be done until the investigation is complete and the full extent of the compromise is understood. The finding should also be noted for inclusion in the final report.

[Removed]Option: C

C. Investigate the high numbered port connections should be the NEXT step for the penetration tester. The netstat command output shows several established connections, including one to port 80, the default port for HTTP traffic. The other established connections are to high numbered ports, which could indicate a suspicious activity, such as a backdoor, a malware communicating with a command-and-control server, or a connection to a compromised system.

[Removed]

Therefore, the penetration tester should investigate the high numbered port connections further to determine their purpose and whether they pose a threat to the system. This investigation could involve examining the processes associated with the connections, analyzing network traffic, or checking for indicators of compromise. After completing the investigation, the tester should note the findings for inclusion in the final report, along with any recommendations for remediation. The tester should also consider contacting the client immediately if the investigation reveals an ongoing attack or a significant risk to the system's security. Closing the reverse shell or contacting the client immediately may not be appropriate until the investigation of the established connections is complete.

WANDOOCHOCOOption: D

should share this ASAP

vazq77Option: D

for sure

KingIT_ENGOption: D

D is the correct answer Contact the client immediately

Etc_Shadow28000Option: C

C. Investigate the high numbered port connections. Explanation: The netstat output shows several established connections and listening ports, including some high-numbered ports. Investigating these connections can reveal more about the server’s activity, potentially uncovering more vulnerabilities or unusual activity that could be relevant for privilege escalation or understanding the server’s configuration and security posture.

Hedwig74Option: C

investigate...you have a shell open already, could be yours...

deedenOption: C

Agree with option C. Need to establish facts of true positive IoC first to communicate. Suspicious, yes, but does it immediately indicate IoC? I don't think you would want to be calling your client contact for every false-positive findings you encounter during the engagement.

kipsOption: D

I would go with D

AaronS1990Option: C

"Exploiting the vulnerability allows the tester to open a reverse shell" Pretty sure that means he has already tested the ports and so shoud escalate it next

lifehacker0777Option: C

Given that netstat -antu shows a high number of foreign IP connections established on the server, the penetration tester should investigate these connections further. This could potentially indicate that the server has been compromised by an attacker, or that there is unauthorized access to the server from outside sources. Therefore, the NEXT step that the penetration tester should take is to investigate the high numbered port connections further (Option C). This could involve examining the source IP addresses and ports of the connections, as well as any associated processes or services. The tester should also determine if any of the connections are associated with known malicious activity.