🔥 40% Off Crucial Exams Memberships — Deal ends today!

44 minutes, 40 seconds remaining!

Certified Ethical Hacker (CEH) Practice Question

During a post-exploitation session, you have a low-privilege shell on a Windows 10 host. Service enumeration shows a service named BackupAgent running as LocalSystem with the executable path C:\Program Files\Backup Agent\backupagent.exe, and the folder is writable by your user. The ImagePath value is not surrounded by quotes. What privilege-escalation method would most directly leverage this misconfiguration?

  • Drop a malicious backupagent.dll into the service directory to take advantage of DLL search order hijacking.

  • Set the AlwaysInstallElevated registry keys and run a crafted MSI package to gain SYSTEM privileges.

  • Place a malicious binary named C:\Program.exe and restart the service, exploiting an unquoted service path vulnerability.

  • Use the netsh add helper command to load a rogue DLL under the SYSTEM context.

Certified Ethical Hacker (CEH)
System Hacking Phases and Attack Techniques
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot