🔥 40% Off Crucial Exams Memberships — Deal ends today!

1 hour, 27 minutes remaining!

Certified Ethical Hacker (CEH) Practice Question

During a post-exploitation session, you have a low-privilege shell on a Windows 10 host. Service enumeration shows a service named BackupAgent running as LocalSystem with the executable path C:\Program Files\Backup Agent\backupagent.exe, and the folder is writable by your user. The ImagePath value is not surrounded by quotes. What privilege-escalation method would most directly leverage this misconfiguration?

  • Set the AlwaysInstallElevated registry keys and run a crafted MSI package to gain SYSTEM privileges.

  • Use the netsh add helper command to load a rogue DLL under the SYSTEM context.

  • Drop a malicious backupagent.dll into the service directory to take advantage of DLL search order hijacking.

  • Place a malicious binary named C:\Program.exe and restart the service, exploiting an unquoted service path vulnerability.

Certified Ethical Hacker (CEH)
System Hacking Phases and Attack Techniques
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot