Gaining Access Practice
Turn findings into footholds by exploiting vulnerabilities and misconfigurations within clearly defined rules of engagement.
1. Question
Exploiting an SQL injection vulnerability to dump user credentials from a database BEST fits which phase?
2. Question
Which of the following is the MOST appropriate initial action after successfully obtaining a low-privilege shell on a target system?
3. Question
A client application passes a JWT in a cookie. Which weakness would MOST likely allow you to gain access as another user?
4. Question
Which action BEST represents exploiting a misconfiguration to gain access?
5. Question
Why is it important to align exploitation attempts with clearly defined rules of engagement?
6. Question
Which approach is MOST appropriate when you discover valid credentials belonging to a highly privileged user during a test?
7. Question
Which of the following MOST clearly demonstrates chaining vulnerabilities to gain access?
8. Question
You exploit an RCE vulnerability on a web server, but outbound connections are heavily restricted. What is the MOST appropriate next step?
9. Question
Which factor is MOST important when deciding whether to fully exploit a vulnerability during a pentest?
10. Question
Why might you simulate credential stuffing against a staging environment rather than production?