Gaining Access Practice

Turn findings into footholds by exploiting vulnerabilities and misconfigurations within clearly defined rules of engagement.

1. Question

Exploiting an SQL injection vulnerability to dump user credentials from a database BEST fits which phase?

2. Question

Which of the following is the MOST appropriate initial action after successfully obtaining a low-privilege shell on a target system?

3. Question

A client application passes a JWT in a cookie. Which weakness would MOST likely allow you to gain access as another user?

4. Question

Which action BEST represents exploiting a misconfiguration to gain access?

5. Question

Why is it important to align exploitation attempts with clearly defined rules of engagement?

6. Question

Which approach is MOST appropriate when you discover valid credentials belonging to a highly privileged user during a test?

7. Question

Which of the following MOST clearly demonstrates chaining vulnerabilities to gain access?

8. Question

You exploit an RCE vulnerability on a web server, but outbound connections are heavily restricted. What is the MOST appropriate next step?

9. Question

Which factor is MOST important when deciding whether to fully exploit a vulnerability during a pentest?

10. Question

Why might you simulate credential stuffing against a staging environment rather than production?

Score: 0.0 / 10 (0 of 10 correct)