Exam PT0-002 All QuestionsBrowse all questions from this exam
Question 139

A penetration tester has obtained shell access to a Windows host and wants to run a specially crafted binary for later execution using the ymic.exe process call create function. Which of the following OS or filesystem mechanisms is MOST likely to support this objective?

    Correct Answer: A

    Alternate data streams (ADS) is a feature of the NTFS filesystem in Windows that allows data to be stored in a hidden stream of a file. This makes it possible to hide and run specially crafted binaries without them being easily detected. WMIC.exe (assuming the typo 'ymic.exe' refers to this) can execute such hidden binaries from these alternate data streams, making this the most likely OS or filesystem mechanism to support the objective.

Discussion
ryanzouOption: B

B FOR SURE

cy_analystOption: A

Alternate data streams is the most likely OS or filesystem mechanism that would support running a specially crafted binary using the ymic.exe process call create function. Alternate data streams are a feature of the NTFS filesystem that allow additional data to be stored in a file's metadata, alongside the main data stream. This means that a specially crafted binary could be hidden in an alternate data stream of a legitimate file, and then executed using the ymic.exe process call create function, which allows for the execution of files located in alternate data streams.

[Removed]

B is for sure

[Removed]

its wmic not ymic so B is correct

cy_analyst

Check this out: A. Alternate data streams is the most likely OS or filesystem mechanism to support this objective. Alternate data streams (ADS) is a feature of the Windows NTFS file system that allows data to be stored in a hidden stream of a file. This hidden stream can be accessed and executed using the wmic.exe process call create function, allowing the penetration tester to run the specially crafted binary. PowerShell modules are a collection of scripts that can be used to extend the functionality of PowerShell, but they are not directly related to running a binary using the wmic.exe process call create function. MP4 steganography involves hiding data within an MP4 video file, but this is not related to running a binary using the wmic.exe process call create function. ProcMon is a Windows utility that monitors and logs system activity, but it is not directly related to running a binary using the wmic.exe process call create function.

KingIT_ENG

https://docs.microsoft.com/en-us/windows/win32/wmisdk/connecting-to-wmi-on-a-remote-computer-by-using-powershell check

cy_analyst

Ok this is wrong.

cy_analyst

you are correct.

[Removed]Option: A

Alternate data streams (ADS) is a feature of the NTFS filesystem in Windows that allows a file to contain additional hidden data streams. These data streams can be accessed and manipulated by the file system API or other utilities, and can be used to store executable code, shellcode, or other malicious payloads that are not visible to the user or antivirus software. By leveraging ADS, a penetration tester can hide the payload in a legitimate-looking file, and then execute it using the ymic.exe process call create function, which will execute the hidden code along with the main program. Therefore, option A is the correct answer.

nickwen007Option: A

The most likely OS or filesystem mechanism to support the objective of running a specially crafted binary using the ymic.exe process is A. Alternate data streams. Alternate data streams allows files to store additional data and metadata in a separate stream that is not visible when viewing the file directly, making it an ideal option for stealthy execution of malicious binaries.

[Removed]

Not ymic.exe its wmic.exe so B is correct

cy_analyst

Alternate data streams are a feature of the NTFS file system used in Windows that allow data to be hidden within a file without affecting its normal operation. This can be used by attackers to hide malicious code within a file that appears harmless to the system and its users. Using the wmic.exe process call create function, the penetration tester can create a new process and execute the binary from the alternate data stream, thereby bypassing any security measures that would normally detect and prevent the execution of the binary. Options B, C, and D are not relevant to this objective. PowerShell modules are used for scripting and automation tasks in Windows, but they do not provide a means of executing a binary from an alternate data stream. MP4 steganography involves hiding data within multimedia files, which is not applicable to this scenario. ProcMon is a process monitoring tool that can be used to analyze system activity, but it does not provide a means of executing a binary from an alternate data stream.

2FishOption: B

B. Check this link for more context. https://www.examtopics.com/discussions/comptia/view/66647-exam-pt1-002-topic-1-question-46-discussion/

[Removed]Option: B

B is answer

Etc_Shadow28000Option: A

The OS or filesystem mechanism that is MOST likely to support running a specially crafted binary for later execution using the `wmic.exe process call create` function is: A. Alternate data streams

Etc_Shadow28000

Explanation: Analysis of Other Options: B. PowerShell modules: PowerShell modules are used to package scripts and functions for reuse in PowerShell. While they can be used to run scripts, they are not specifically related to hiding or delaying the execution of a binary through `wmic.exe`. C. MP4 steganography: This involves hiding data within MP4 video files. While it can be used to conceal data, it is not directly related to executing a binary using `wmic.exe`. D. ProcMon: ProcMon (Process Monitor) is a monitoring tool for Windows that shows real-time file system, Registry, and process/thread activity. It is not used for executing or hiding binaries. Conclusion: Alternate Data Streams (ADS) are the most suitable mechanism for supporting the objective of running a specially crafted binary for later execution using the `wmic.exe process call create` function. This technique leverages the NTFS file system's capability to hide executable code within files, allowing for stealthy execution.

surfugandaOption: A

I'm going with: A. Alternate Data Streams. Had a similar question for CEH exam.

deedenOption: A

Rewording... if I want to hide a malicious .exe file for later execution, which one should I use? Only A and C make sensible answers, but not all Windows systems keep MP4, thus ADS makes more sense.

YokotaOption: A

ADS is a feature of the NTFS file system used in Windows. It allows more than one data stream to be associated with a filename, using the format filename:streamname. This feature can be used to hide files and execute them without being easily detected by users or some security software. A penetration tester could use ADS to hide the specially crafted binary and execute it later, which aligns with the objective described.

PhillyCheeseOption: B

Windows Management Instrumentation (WMI) allows scripting languages (such as VBScript or Windows PowerShell) to manage Microsoft Windows personal computers and servers, both locally and remotely. https://en.m.wikipedia.org/wiki/Windows_Management_Instrumentation

PhillyCheese

Also, "ymic.exe" is a typo. WMIC.exe is a command-line utility that allows you to access and control Windows-based devices using Windows Management Instrumentation (WMI). WMI is a technology that lets you query and manipulate various aspects of the operating system and hardware. You can use WMIC.exe to perform tasks such as listing processes, services, users, drives, network settings, and more. You can also use WMIC.exe to execute methods, create or delete instances, and modify properties of WMI classes. WMIC.exe is compatible with existing shells and utility commands and can be used by local system administrators. https://learn.microsoft.com/en-us/windows/win32/wmisdk/wmic

CaoilfhionOption: B

Don't overthink the question: it's not asking about how to smuggle the binary on the system, how to hide it, or even how to create a shell with it. It's asking "how" to run a binary, already there, the other information given is superfluous and meant to throw you off. While ADS can get it on there, it's not asking that. Doesn't matter (essentially) what is smuggled on there, it's asking how run it. In this case, Powershell is the only thing listed that will start anything... I can only stretch for ProcMon if there's a way to get ProcMon to call wmic.exe that I'm not familiar with (which is possible, I'm not sure). The scenario is stating that it will USE wmic.exe to run an already smuggled binary, but what is the best method of invoking wmic.exe first?

stephyfresh13

It appears there might be a typographical error in your question, as there is no commonly known tool named "ymic.exe" that I'm aware of. If you meant "wmic.exe" and there is a specific tool or concept you were referring to with "ymic.exe," please provide additional context or clarification. Assuming you are referring to "wmic.exe," here's information about it: wmic.exe (Windows Management Instrumentation Command-line) B is the correct answer

pentesternonameOption: A

Alternate data streams (ADS) is a feature in NTFS (New Technology File System), the file system used by Windows operating systems, that allows additional data to be associated with a file or folder. Penetration testers and attackers can use ADS to hide data or binaries within a file without altering its size or appearance. By creating an alternate data stream and hiding a specially crafted binary within it, an attacker can execute the binary using the ymic.exe process call create function, making it a suitable choice for this objective.

solutionzOption: A

Alternate Data Streams (ADS) are a feature of the NTFS file system used in Windows. They allow data to be embedded within existing files without changing their functionality or size as seen in standard file attributes. This can be exploited by attackers to hide malware or specially crafted binaries within seemingly benign files. So, in this context, the correct option for hiding a specially crafted binary for later execution using a specific process call would be: A. Alternate data streams The other options (PowerShell modules, MP4 steganography, and ProcMon) could have relevance in other contexts, but for hiding a binary within a Windows host, ADS is the most applicable choice.

KingIT_ENGOption: B

B PowerShell module

klougOption: A

Alternate data streams are the most likely OS or filesystem mechanism to support running a specially crafted binary for later execution using the wmic.exe process call

[Removed]

B is the answer power shell