312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 113


Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?

Show Answer
Correct Answer: AD

getsystem is a Metasploit post-exploitation module designed to escalate privileges on Windows systems. It attempts to elevate the privileges of the current user to the highest possible level, often SYSTEM-level privileges, through various techniques such as named pipe impersonation, service exploitation, or token duplication. The getuid module is used to retrieve the user ID of the current user; keylogrecorder is used for logging keystrokes; and autoroute is used for adding a network route to the target system. Therefore, none of the other modules is intended for privilege escalation.

Discussion

7 comments
Sign in to comment
eli117Option: A
Apr 5, 2023

The getsystem module is a built-in Metasploit module that attempts to elevate the privileges of the current user to the highest possible level, including SYSTEM-level privileges. The getuid module is used to retrieve the user ID of the current user on the target system. The keylogrecorder module is used to log keystrokes on the target system, and the autoroute module is used to add a route to the target system. Neither of these modules is used for privilege escalation.

jeremy13Option: A
May 3, 2023

A. getsystem Like Q341 V11

Vincent_LuOption: A
Jun 29, 2023

A. getsystem

Vincent_Lu
Jul 11, 2023

A. getsystem: This module elevates privileges on the target system, providing system-level access. B. getuid: This module retrieves identity information of the current user, such as the username and privilege level. C. keylogrecorder: This module records keyboard inputs, including passwords and sensitive information. D. autoroute: This module configures routing information on the exploited system for easier access to other networks or hosts.

victorfsOption: A
May 21, 2023

A. Getsystem

insaniuntOption: A
Dec 27, 2023

A. getsystem This is a Metasploit post-exploitation module that can be used to escalate privileges on Windows systems by abusing various techniques, such as named pipe impersonation, service exploitation, or token duplication

sshksankOption: A
Jun 6, 2024

CEH V12, Page.688 try to escalate the privileges by issuing a getsystem command that attempts to elevate the user privileges.

a307962Option: A
Jul 7, 2024

A. getsystem