An analyst is connected to the same network segment as various hosts that transmit credentials in plaintext. Which tactic is best for intercepting and collecting those credentials from multiple endpoints?
Forward credentials by forwarding service requests
Scan devices for weak default passwords
Manipulate VLAN frames to hop across segments
Establish an on-path approach to capture unprotected exchanges
An on-path approach allows direct inspection of the unencrypted exchange as it traverses the local segment. Scanning for default logins focuses on known weak access details but does not intercept network-based credentials. VLAN manipulation involves breaking out of a VLAN but does not guarantee interception of unencrypted passwords. Relaying data requires a specific configuration with services that accept forwarded credentials, which is less direct than capturing data from multiple hosts in transit.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does an on-path attack involve?
Open an interactive chat with Bash
Why can't scanning for weak default passwords intercept credentials?
Open an interactive chat with Bash
How does VLAN hopping differ from on-path attacks?