🔥 40% Off Crucial Exams Memberships — Deal ends today!

1 hour, 53 minutes remaining!

Certified Ethical Hacker (CEH) Practice Question

While testing a company's cloud deployment, you obtain low-privilege shell access to a web application running on an Amazon EC2 instance that still permits requests to the default Instance Metadata Service v1 (IMDSv1) endpoint. To assess whether you can pivot and leverage the instance's permissions against other AWS resources, which immediate action should you take?

  • Craft DNS queries to the EC2 internal resolver to list reachable subdomains and infer accessible S3 buckets.

  • Launch an ARP poisoning attack against the VPC's virtual router to capture IAM credential traffic in transit.

  • Send an HTTP GET request to http://169.254.169.254/latest/meta-data/iam/security-credentials/ from the shell to obtain the instance profile's temporary AWS keys.

  • Perform a full TCP scan of the 10.0.0.0/8 private range to locate other instances with open SSH services.

Certified Ethical Hacker (CEH)
Cloud Computing
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot