⚡Flash Sale: 33% off Annual Membership, limited time only!⚡

CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA PenTest+ PT0-002 Practice Question

During a penetration test, you have obtained a low-privileged user shell on a Linux system. You want to perform privilege escalation to gain root access. Which of the following methods would be the most effective initial step in identifying potential vectors for vertical privilege escalation?

  • Review all entries in the /etc/crontab for cron jobs that a user may be able to modify

  • Examine the /etc/passwd file for users with a UID of 0

  • Check currently running processes and services using commands like ps aux, top, or systemctl

  • Brute-force the root account password using a tool like Hydra

This question's topic:
CompTIA PenTest+ PT0-002 / 
Attacks and Exploits
Your Score:
Attacks and Exploits
Planning and Scoping
Information Gathering and Vulnerability Scanning
Reporting and Communication
Tools and Code Analysis