PT0-002 Dumps

PT0-002 Free Practice Test

CompTIA PT0-002: CompTIA PenTest+ Certification Exam

QUESTION 16

During an assessment, a penetration tester manages to exploit an LFI vulnerability and browse the web log for a target Apache server. Which of the following steps would the penetration tester most likely try NEXT to further exploit the web server? (Choose two.)

Correct Answer: DF
Local File Inclusion (LFI) is a web vulnerability that allows an attacker to include files on a server through the web browser. This can expose sensitive information or lead to remote code execution.
Some possible next steps that a penetration tester can try after exploiting an LFI vulnerability are:
PT0-002 dumps exhibit Log poisoning: This involves injecting malicious code into the web server’s log files and then including them via LFI to execute the code34.
PT0-002 dumps exhibit PHP wrappers: These are special streams that can be used to manipulate files or data via LFI. For
example, php://input can be used to pass arbitrary data to an LFI script, or php://filter can be used to encode or decode files5.

QUESTION 17

A penetration tester discovered a vulnerability that provides the ability to upload to a path via directory traversal. Some of the files that were discovered through this vulnerability are:
PT0-002 dumps exhibit
Which of the following is the BEST method to help an attacker gain internal access to the affected machine?

Correct Answer: C

QUESTION 18

A penetration tester received a .pcap file to look for credentials to use in an engagement. Which of the following tools should the tester utilize to open and read the .pcap file?

Correct Answer: B

QUESTION 19

During a penetration test, you gain access to a system with a limited user interface. This machine appears to have access to an isolated network that you would like to port scan.
INSTRUCTIONS
Analyze the code segments to determine which sections are needed to complete a port scanning script. Drag the appropriate elements into the correct locations to complete the script.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
PT0-002 dumps exhibit
Solution:
A picture containing shape Description automatically generated
PT0-002 dumps exhibit
A picture containing treemap chart Description automatically generated
PT0-002 dumps exhibit
Text Description automatically generated
PT0-002 dumps exhibit
Graphical user interface Description automatically generated
PT0-002 dumps exhibit

Does this meet the goal?

Correct Answer: A

QUESTION 20

A company has recruited a penetration tester to conduct a vulnerability scan over the network. The test is confirmed to be on a known environment. Which of the following would be the BEST option to identify a system properly prior to performing the assessment?

Correct Answer: A