Exam PT0-002 All QuestionsBrowse all questions from this exam
Question 284

A penetration tester executes the following Nmap command and obtains the following output:

Which of the following commands would BEST help the penetration tester discover an exploitable service?

    Correct Answer: A

    To discover an exploitable service, targeting the SMTP service running on port 25 with the command 'nmap -v -p 25 --script smtp-enum-users remotehost' is the best approach. The 'smtp-enum-users' script specifically targets SMTP services to enumerate valid usernames, which can help identify potential accounts that could be exploited. While other commands gather useful information, they do not specifically target exploitable vulnerabilities as directly as the 'smtp-enum-users' script does for the SMTP service.

Discussion
MartinRBOption: B

to "discover an exploitable service" B. nmap -v --script=mysql-info.nse remotehost -v: Enables verbose mode. --script=mysql-info.nse: Executes the Nmap script "mysql-info.nse," which is designed to gather information about a MySQL server. This command is used to obtain information about the MySQL service running on the target host, including version details and configuration.

Etc_Shadow28000Option: A

A. nmap -v -p 25 –script smtp-enum-users remotehost: This command specifically targets the SMTP service running on port 25. The smtp-enum-users script is useful for enumerating valid usernames on the SMTP server, which can help identify potential accounts that could be exploited. -------------------------------------- B. nmap -v –script=mysql-info.nse remotehost: This command targets the MySQL service but only gathers general information about the MySQL server. While useful, it is not specifically designed to identify exploitable vulnerabilities. C. nmap –script=smb-brute.nse remotehost: This command targets SMB services, which are not listed in the scan results. Therefore, it would not be applicable to the services found in the scan. D. nmap -p 3306 –script “httpvuln” remotehost: This command attempts to run scripts related to HTTP vulnerabilities against the MySQL port (3306), which is not appropriate since 3306 is not an HTTP service.

AliyanOption: B

needs to get into SQL. it is also running unauthorizes DB. also DB has more value than Mail server

DRVisionOption: A

targeting the open SMTP port 25