Certified Ethical Hacker (CEH) Practice Test
Use the form below to configure your Certified Ethical Hacker (CEH) Practice Test. The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Certified Ethical Hacker (CEH) Information
About the Certified Ethical Hacker (CEH) Exam
The EC-Council's Certified Ethical Hacker (CEH) 312-50 exam is a globally recognized certification designed for cybersecurity professionals. The exam validates a professional's foundational knowledge of ethical hacking tools, techniques, and methodologies. It consists of 125 multiple-choice questions that must be completed within a four-hour timeframe. The primary goal of the CEH certification is to ensure that the holder can identify vulnerabilities and weaknesses in computer systems by thinking and acting like a malicious hacker, but with the owner's permission. This certification is intended for a range of professionals, including security officers, auditors, site administrators, and anyone concerned with the integrity of their network infrastructure.
Domains Covered in the CEH Exam
The CEH 312-50 exam covers a broad spectrum of topics, structured into various modules. These domains are designed to provide a comprehensive understanding of the ethical hacking process from start to finish. Some of the core areas include an introduction to ethical hacking, footprinting, and reconnaissance to gather information about a target. Candidates are also tested on network scanning techniques, enumeration to identify users and resources, and vulnerability analysis to uncover security loopholes. Furthermore, the exam delves into more offensive topics such as system hacking, malware threats, sniffing to intercept network traffic, and social engineering. Advanced topics like Denial-of-Service (DoS) attacks, session hijacking, hacking web servers and applications, SQL injection, and hacking wireless networks are also integral parts of the curriculum. The syllabus also includes modern security challenges related to cloud computing, the Internet of Things (IoT), and mobile platforms.
The Benefit of CEH Practice Exams
Incorporating practice exams into your study routine is a highly effective strategy for preparing for the CEH 312-50 exam. These mock tests are designed to replicate the actual exam environment, helping you become familiar with the format, timing, and difficulty of the questions. By taking practice exams, you can significantly improve your time management skills, which is crucial for completing all 125 questions within the four-hour limit. One of the most significant benefits of practice exams is their ability to help you identify your weak areas. Analyzing your performance on these tests allows you to pinpoint specific domains where you need to focus your studies, making your preparation more efficient. Regularly taking practice tests can also boost your confidence and reduce test anxiety, ensuring you perform at your best on the actual exam day.

Free Certified Ethical Hacker (CEH) Practice Test
- 20 Questions
- Unlimited time
- Information Security and Ethical Hacking OverviewReconnaissance TechniquesSystem Hacking Phases and Attack TechniquesNetwork and Perimeter HackingWeb Application HackingWireless Network HackingMobile Platform, IoT, and OT HackingCloud ComputingCryptography
During an internal audit you discover that staff can still transfer confidential data to personal USB drives. Management already reviews system logs weekly and has a policy that forbids such behavior, but wants a technical measure that blocks it outright. According to standard security control categories, which control type best meets this requirement?
Deploy a detective control that generates real-time alerts whenever files are written to USB media
Strengthen the deterrent control by displaying legal warning banners about data exfiltration penalties
Implement a preventive control that disables or restricts USB mass-storage devices on all workstations
Add a corrective control that automatically deletes unauthorized files from USB drives after transfer
Answer Description
Security control categories describe the intent of a safeguard. A preventive control is designed to stop an unwanted action from occurring in the first place. Disabling or restricting USB mass-storage functionality on endpoints prevents users from writing data to removable media, eliminating the opportunity for unauthorized copies. Detective controls (such as log analysis or alerts) only identify events after they happen, while corrective controls attempt to remediate damage that has already occurred. Deterrent controls, including policies or warning banners, rely on influencing behavior but do not technically block the action. Therefore, a preventive control that technically disallows USB storage access is the most appropriate solution to meet management's requirement to stop the transfers outright.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a preventive control in cybersecurity?
How can USB mass-storage devices be technically restricted or disabled?
What is the difference between preventive, detective, corrective, and deterrent controls?
What are preventive controls in cybersecurity?
How can USB mass-storage devices be disabled or controlled effectively?
What is the difference between preventive, detective, corrective, and deterrent controls?
During a penetration test of a U.S. commercial bank, you obtain files containing customers' social security numbers, account balances, and loan histories. The bank's legal counsel reminds you that a specific federal law mandates protection of this non-public personal information and requires the institution to issue privacy notices to customers. Which regulation are they referring to?
Payment Card Industry Data Security Standard (PCI DSS)
Health Insurance Portability and Accountability Act (HIPAA)
Gramm-Leach-Bliley Act (GLBA)
Children's Online Privacy Protection Act (COPPA)
Answer Description
The Gramm-Leach-Bliley Act (GLBA), formally the Financial Services Modernization Act of 1999, applies to U.S. financial institutions. It requires safeguarding of non-public personal information and obligates covered entities to provide annual privacy notices explaining their information-sharing practices. HIPAA governs health data, PCI DSS focuses on payment card information, and COPPA protects children's online data; none of these specifically impose privacy notice and safeguard rules on banks for customer financial records.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Gramm-Leach-Bliley Act (GLBA)?
How is GLBA different from HIPAA and PCI DSS?
What are the key requirements under the GLBA Safeguards Rule?
What is the Gramm-Leach-Bliley Act (GLBA)?
What types of information are considered non-public personal information (NPI) under GLBA?
How does GLBA differ from PCI DSS in terms of data protection?
During an internal assessment you transmit thousands of DHCPDISCOVER messages, each with a unique spoofed MAC address, until the corporate DHCP server's address pool is completely exhausted. You then launch your own unauthorized DHCP service in 'authoritative' mode that responds first and assigns new hosts an IP configuration whose default gateway points to your laptop, allowing you to capture their traffic. Which DHCP-based attack technique are you executing?
Abusing DHCP Option 82 to spoof relay information and redirect traffic.
A DHCP starvation attack combined with a rogue DHCP server takeover to perform a man-in-the-middle.
A broadcast smurf-style DHCP flood intended only to crash the server.
DHCP relay agent spoofing to circumvent VLAN access-control lists.
Answer Description
The tester is first performing a DHCP starvation attack-flooding the legitimate server with requests that consume every available lease. Once no addresses remain, clients will accept the first DHCPOFFER they see. By immediately running a rogue (unauthorized) DHCP server, the attacker becomes that first responder and supplies malicious options such as a default gateway or DNS server under her control. This combination is the textbook DHCP starvation followed by rogue DHCP server takeover, enabling man-in-the-middle sniffing. The other options describe different DHCP abuse methods but do not deplete the pool and then mis-serve clients from a fake DHCP service.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a DHCP starvation attack?
How does a rogue DHCP server enable a man-in-the-middle attack?
What is the significance of 'authoritative mode' in rogue DHCP servers?
What is a DHCP starvation attack?
What is a rogue DHCP server, and how does it work?
What is a man-in-the-middle attack, and how does DHCP play a role in it?
An ethical hacker uses theHarvester to gather staff email addresses from public search engines and LinkedIn without interacting directly with the target's infrastructure. According to the standard hacking methodology, which phase is being conducted and what form of reconnaissance is this?
Enumeration and active reconnaissance
Gaining access and passive reconnaissance
Footprinting and passive reconnaissance
Scanning and active reconnaissance
Answer Description
Collecting publicly available information about a target before sending any traffic toward its systems belongs to the first phase of the hacking methodology, commonly called Footprinting or Reconnaissance. Because only third-party services are queried and no packets are sent to the organization, the activity is classified as passive reconnaissance. Scanning and enumeration occur later, after the tester has begun actively probing the target, while the gaining-access phase involves exploitation rather than information collection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is footprinting in ethical hacking?
What is passive reconnaissance, and how does it differ from active reconnaissance?
What is theHarvester and how does it work?
What is passive reconnaissance in ethical hacking?
How does theHarvester tool assist in Footprinting?
Why is Footprinting important in ethical hacking?
During an internal penetration test you compromise a Windows workstation and, with Responder, capture the domain administrator's NTLMv2 hash over SMB. Cracking the hash is unlikely to succeed before the engagement ends, but the environment still allows NTLM authentication. Which technique will let you open an interactive shell on another domain-joined server without first recovering the clear-text password?
Conduct a password-spraying campaign across domain hosts with the administrator username and a shortlist of common passwords.
Forge a Golden Ticket for the administrator by generating a counterfeit krbtgt ticket and injecting it into your session.
Use a pass-the-hash attack with an SMB execution tool such as Impacket's psexec.py to authenticate using the captured NTLM hash.
Request and crack the administrator's service tickets through Kerberoasting, then reuse the recovered keys to log in.
Answer Description
A pass-the-hash attack lets you authenticate to an SMB service by presenting the captured NTLMv2 hash in place of the real password. Tools such as Impacket's psexec.py (or smbexec.py) perform the NTLM challenge-response with the supplied hash, create a service on the remote host, and return a SYSTEM-level shell. Password spraying requires plaintext guesses, Kerberoasting focuses on cracking service-account keys from Kerberos tickets rather than giving immediate access, and forging a Golden Ticket needs the krbtgt account's password hash-not just one administrator's NTLM hash.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is NTLM authentication?
How does a pass-the-hash attack work?
What is Impacket's psexec.py tool and how does it help with pass-the-hash attacks?
During a Windows desktop security review, you must recommend a built-in countermeasure that will help endpoint anti-malware engines detect fileless attacks launched through PowerShell, VBScript, or WMI without relying on a signature stored on disk. Which native feature should you ensure is enabled so the AV solution can inspect the script content in memory?
Encrypting File System (EFS)
BitLocker with TPM-only mode
Windows Anti-Malware Scan Interface (AMSI)
Microsoft Software Restriction Policies (SRP)
Answer Description
Windows Anti-Malware Scan Interface (AMSI) exposes the content of scripts and other dynamic code to the installed antivirus engine as the code is loaded into memory, allowing heuristic and behavior-based inspection that can stop fileless threats before execution. Encrypting File System only protects data at rest and does nothing to inspect running scripts. Software Restriction Policies can block executables by path or hash but cannot analyze the in-memory script text of PowerShell or WMI. BitLocker with TPM-only mode protects the drive during offline attacks yet provides no runtime visibility into script content. Therefore, enabling AMSI integration is the appropriate countermeasure for detecting memory-resident, script-based malware.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is AMSI and how does it help detect fileless attacks?
How does AMSI differ from traditional signature-based anti-malware systems?
Why are fileless attacks harder to detect compared to traditional malware?
While analyzing switch port mirroring logs, you notice host 52:54:00:ab:cd:ef repeatedly sending unsolicited ARP reply packets that state "192.168.50.1 is-at 52:54:00:ab:cd:ef," even though the legitimate default gateway has MAC 00:25:90:12:34:56. Shortly afterward, several workstations begin routing their traffic through the rogue host. Which sniffing-related spoofing technique is the attacker using to redirect the traffic?
ARP poisoning (ARP spoofing) to perform a man-in-the-middle attack
DNS cache poisoning to redirect hostname lookups
MAC flooding to overflow the switch's CAM table
DHCP spoofing to issue fraudulent default-gateway information
Answer Description
The attacker is performing ARP poisoning (also called ARP spoofing). By crafting fake ARP reply frames that bind the gateway's IP address to the attacker's MAC address, the attacker poisons the victims' ARP caches. Traffic destined for the gateway is then sent to the attacker, allowing passive sniffing or an active man-in-the-middle position.
MAC flooding targets a switch's CAM table to force the device into hub-like behavior but does not forge gateway mappings. DHCP spoofing uses rogue DHCP offers to supply malicious network configuration values, and DNS spoofing tampers with name resolution responses rather than Layer-2 address resolution. None of those alternatives explain unsolicited ARP replies claiming the gateway's IP-to-MAC association.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is ARP poisoning, and how does it work?
What is the difference between ARP poisoning and MAC flooding?
How does ARP poisoning facilitate a man-in-the-middle attack?
What is ARP poisoning and how does it work?
How does ARP poisoning differ from MAC flooding?
What is the difference between ARP poisoning and DNS spoofing?
An organization enables 802.11w Protected Management Frames (PMF) on all enterprise access points. During a wireless security assessment, which previously common threat is largely neutralized because the attacker can no longer inject forged management frames that force clients off the network?
Setting up an Evil Twin rogue access point broadcasting the same SSID
Sending repeated ARP request packets to accelerate IV reuse and crack WEP keys
Brute-forcing the WPS PIN to recover the WPA/WPA2 passphrase
Flooding clients with spoofed deauthentication or disassociation frames to force reconnects
Answer Description
802.11w adds cryptographic protection (integrity and optional encryption) to management frames such as deauthentication and disassociation. When PMF is required by both the AP and the client, any spoofed deauth or disassoc frames sent by an attacker fail the integrity check and are dropped, preventing the classic deauthentication or disassociation denial-of-service technique used to capture handshakes or disrupt connectivity. ARP replay targets data frames in WEP networks and is unaffected by PMF. WPS PIN brute forcing abuses a design flaw in the WPS protocol and does not rely on management-frame spoofing. An Evil Twin rogue AP attack leverages fake beacon and probe responses; PMF does not stop clients from seeing other beacons, so it remains possible. Therefore, deauthentication/disassociation flooding is the attack that PMF specifically mitigates.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Protected Management Frames (PMF) in 802.11w?
How does PMF prevent deauthentication or disassociation attacks?
Why doesn't 802.11w PMF protect against Evil Twin attacks?
What are 802.11w Protected Management Frames (PMF)?
How does PMF prevent deauthentication or disassociation attacks?
Are there attacks PMF does not protect against?
While conducting a penetration test against the /24 network range explicitly authorized in the contract, you discover an unsecured FTP service whose IP address belongs to an external third-party vendor that was never mentioned during scoping. According to ethical hacking concepts and professional conduct, what action should you take next?
Proceed to exploit the FTP server only enough to capture evidence of the vulnerability.
Ignore the finding and continue testing the originally scoped IP addresses.
Contact the vendor directly, obtain verbal permission, and then resume testing the discovered server.
Notify the client immediately and request written authorization before performing any further testing against the vendor's system.
Answer Description
Because the vendor-owned system is outside the written scope, any interaction beyond the discovery phase would be unauthorized hacking. Ethical hacking principles and common rules of engagement require that the tester halt activity on the out-of-scope target and obtain explicit, preferably written, permission before proceeding. Simply exploiting the server, ignoring the host, or seeking oral permission from the vendor all violate the requirement that testing occur only on assets specifically approved by the client in advance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is written authorization required before testing systems outside the scope?
What are the consequences of testing systems outside the defined scope without proper authorization?
How does scoping impact ethical hacking engagements?
Why is written authorization necessary before testing a third-party system?
What does '/24 network range' mean in this context?
What should you do if an unauthorized system accidentally falls into scope during testing?
While performing a black-box engagement, you have completed banner grabbing and verified that the target is running Apache 2.4.54 on Debian 11. According to a standard web-server attack methodology, which action should you take NEXT before choosing an exploit to launch against the host?
Begin brute-forcing SSH credentials in order to obtain remote shell access.
Replace the server's TLS certificate with a self-signed one to weaken client trust.
Launch a full-scale denial-of-service attack to test the server's resilience.
Enumerate accessible directories, enabled modules, and sample scripts to locate misconfigurations.
Answer Description
Web-server attack methodology moves from identifying the platform (fingerprinting) to enumerating the server for misconfigurations such as public status pages, sample scripts, directory indexing, or vulnerable modules. This reconnaissance provides concrete evidence of weaknesses and often reveals a precise attack surface. Jumping straight to denial-of-service, credential brute-forcing, or patching skips a critical discovery phase and either creates excessive noise or is outside the attacker's objective. Therefore, systematically enumerating directories, modules, and sample content is the correct next step.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is banner grabbing?
Why is enumerating modules, directories, and scripts critical in web-server attack methodology?
What types of misconfigurations are typically identified during enumeration?
During a penetration test you capture an SMTP session between the organization's mail server and an external partner. After the EHLO exchange you see the command 'STARTTLS' followed by a TLS handshake. Management claims this means all outbound email is now fully encrypted until it reaches recipients. As the consultant, what is the correct explanation?
It establishes an IPsec ESP tunnel between sender and recipient networks, protecting headers and body throughout transit.
The command digitally signs each message with the server's certificate, providing authenticity but not confidentiality.
STARTTLS guarantees end-to-end encryption of the message body until it is opened in the recipient's mail client.
The SMTP channel is encrypted only for this hop; without S/MIME or OpenPGP the message can still be stored or forwarded in clear text later.
Answer Description
SMTP with STARTTLS upgrades the transport connection to TLS only for the single hop between the two mail transfer agents that negotiated it. The message contents are decrypted as soon as they are accepted by the next server and may travel further or be stored in plaintext. End-to-end protection that persists to the recipient's mailbox requires a message-level scheme such as S/MIME or OpenPGP. STARTTLS neither signs the mail nor creates an IPsec tunnel; it simply provides opportunistic, hop-by-hop encryption of the SMTP channel.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is STARTTLS and how does it work in SMTP?
How is STARTTLS different from S/MIME or OpenPGP?
Why doesn’t STARTTLS guarantee full email confidentiality?
What does STARTTLS do in an SMTP session?
What is the difference between STARTTLS and end-to-end encryption?
Why can a message encrypted with STARTTLS still be stored in plaintext later?
While assessing a Java-based site, you run DirBuster and learn that /WEB-INF/web.xml is openly accessible from the Internet. According to the CEH Web Application Hacking Methodology, during which phase would you catalogue and examine such exposed configuration files?
Bypass client-side controls
Footprint web infrastructure
Analyze web applications
Attack authentication mechanisms
Answer Description
Directory and file enumeration, content discovery, and inspection of publicly reachable application resources are performed in the "Analyze web applications" phase. By this point the tester has already completed infrastructure footprinting and now focuses on mapping the application's internal structure (hidden directories, configuration files, comments, parameters, etc.). Phases such as "Footprint web infrastructure," "Bypass client-side controls," and "Attack authentication mechanisms" address different objectives and therefore are not appropriate for evaluating an exposed web.xml file.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DirBuster, and how is it used?
Why is /WEB-INF/web.xml a sensitive file?
What happens during the 'Analyze web applications' phase in CEH methodology?
What is the purpose of the 'Analyze web applications' phase?
What kind of information can be found in the web.xml file?
How does DirBuster assist in the 'Analyze web applications' phase?
During reconnaissance you must find examplecorp.com's public web servers exposing the Apache mod_status (server-status) page, using only passive Shodan queries. Which search string will most directly list company hosts that reveal the mod_status page?
http.favicon.hash:-123456789 "examplecorp.com"
http.component:"Apache" http.status:200 hostname:"examplecorp.com"
"server-status" "examplecorp.com"
http.title:"Apache Status" hostname:"examplecorp.com"
Answer Description
The hostname filter confines results to systems whose reverse DNS or SSL certificate names contain the specified domain. Because the mod_status handler sets the HTML title to Apache Status, combining http.title:"Apache Status" with hostname:"examplecorp.com" precisely targets the desired pages. The plain quoted-string search is too broad; the http.component query would return every Apache site with an HTTP 200 response under the domain, not specifically mod_status; and a favicon hash does not uniquely identify mod_status pages.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Apache mod_status?
What is Shodan and how does it work?
What does the 'http.title' filter do in a Shodan query?
What is Apache mod_status?
How does the Shodan hostname filter work?
Why is http.title:"Apache Status" a better search query in Shodan?
During a web-application penetration test, you discover a critical SQL-injection flaw in the customer portal. Because the development team cannot immediately patch the code, you recommend creating a new rule on the organization's web-application firewall (WAF) to block malicious input that matches common SQL-injection patterns. According to standard information-security control functions, this WAF rule is best classified as which type of control?
Preventive control
Detective control
Corrective control
Compensating control
Answer Description
Security controls are often grouped by their primary function: preventive, detective, corrective, deterrent, and compensating. A web-application firewall rule that inspects traffic and blocks malicious SQL-injection payloads acts before the attack can succeed, thereby stopping the exploitation from occurring. That is the hallmark of a preventive control.
A detective control (such as log monitoring) only identifies an attack after it happens; a corrective control (such as applying a patch or restoring from backup) attempts to fix damage that has already occurred; a compensating control provides an alternate safeguard when the preferred control is infeasible but does not necessarily prevent the action itself. Therefore, the most accurate classification for the proposed WAF rule is preventive.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a web-application firewall (WAF)?
How does a preventive control differ from other types of controls?
What is SQL-injection, and why is it a critical flaw?
What is a SQL-injection flaw in web applications?
How does a web-application firewall (WAF) protect against SQL-injection attacks?
What is the difference between preventive, detective, and corrective controls?
A penetration tester wants to inventory live TCP services on a DMZ host while minimizing the chance that the host application logs the activity. Using the standard Nmap syntax, which scan type meets this goal by sending only an initial SYN and interpreting the target's SYN-ACK or RST response instead of completing the three-way handshake?
TCP ACK scan: nmap -sA
TCP FIN scan: nmap -sF
TCP SYN (half-open) scan: nmap -sS
TCP connect scan: nmap -sT
Answer Description
The TCP SYN (half-open) scan, invoked in Nmap with the -sS option, transmits a single SYN packet to each port. If the target replies with SYN-ACK the port is marked open; if it replies with RST the port is closed. Because the tester immediately resets the connection instead of sending the final ACK, no full TCP session is established, so most applications never record the attempt. TCP connect scan (-sT) completes the handshake and is more easily logged, while ACK (-sA) and FIN (-sF) scans are used primarily for firewall rule discovery and stealth probing of stateless filters, not for reliable open-port enumeration on modern systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is a TCP SYN (half-open) scan considered stealthy?
What differentiates TCP connect scans from TCP SYN scans?
What are TCP FIN and ACK scans used for in penetration testing?
Why is the TCP SYN (half-open) scan less likely to be logged by the host application?
What is the purpose of the three-way TCP handshake, and why doesn't the SYN scan use it?
How does the TCP SYN scan (-sS) differ from other scan types like FIN (-sF) or ACK (-sA)?
An ethical hacker is in the reconnaissance stage and must collect as much detail as possible while guaranteeing zero packets reach the client's network to avoid IDS detection. Which of the following methods satisfies this requirement?
Run an Nmap UDP scan (-sU) against the organization's external IP range from an off-site host.
Establish anonymous SMB sessions from a cloud VPS to enumerate open network shares.
Send crafted AXFR requests to the company's authoritative DNS server to obtain its zone file.
Review the target's domain registration details using a public WHOIS lookup service.
Answer Description
Querying the public WHOIS database is considered passive footprinting because the request is sent only to the registrar's servers, not to any host owned by the target organization. No traffic ever touches the client's infrastructure, so intrusion-detection systems or firewalls at the target cannot see or log the activity. All the other actions-an Nmap UDP scan, SMB null-session enumeration, and requesting a DNS zone-transfer from the authoritative name server-generate direct traffic to the victim network and therefore constitute active reconnaissance, increasing the risk of detection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is passive reconnaissance in ethical hacking?
What is the WHOIS database and how can ethical hackers use it?
Why are actions like Nmap UDP scans considered active reconnaissance?
What is WHOIS and how does it help in reconnaissance?
What is the difference between passive and active reconnaissance?
Why is an Nmap UDP scan considered active reconnaissance?
During an internal penetration test you captured the NTLM hash of the local Administrator account from several Windows 10 workstations using an SMB relay attack. The customer's endpoint detection rules quarantine any new executables written to disk, so you must avoid dropping files on the target. Which approach allows you to execute commands on one of the compromised hosts while honoring this restriction?
Forge a Golden Ticket for the Administrator account and authenticate via Kerberos to obtain a remote shell.
Start a password-guessing attack against the local Administrator account until the clear-text password is discovered.
Use PsExec with the stolen hash to install its service and open an interactive shell over SMB.
Leverage Impacket's wmiexec.py to perform a Pass-the-Hash attack over WMI and run commands in memory on the remote host.
Answer Description
Windows Management Instrumentation (WMI) remote execution can be performed through Impacket's wmiexec.py (or similar tooling) by supplying the stolen NTLM hash instead of the clear-text password-an example of a Pass-the-Hash attack. Because WMI uses DCOM to spawn cmd.exe in memory over the network, no auxiliary binaries need to be copied to the target's file system, keeping the operation fileless.
PsExec also supports Pass-the-Hash, but it transfers and launches a temporary service executable (psexesvc) on disk, which would violate the "no file write" constraint. Brute-forcing the Administrator password would be noisy, slow and unnecessary since valid credentials are already available. A Golden Ticket attack manipulates Kerberos in a domain context and is irrelevant to local-account NTLM hashes on standalone workstations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an NTLM hash, and why is it useful in a Pass-the-Hash attack?
How does Impacket's wmiexec.py work, and why is it beneficial in this scenario?
What is SMB relay and how does it help in capturing NTLM hashes?
While exploiting an unrestricted server-side request forgery in a web application that runs on an Amazon EC2 instance, you intend to retrieve the instance's temporary AWS credentials. The instance still exposes the original Instance Metadata Service (IMDSv1). Which internal URL should you request through the SSRF so that the response contains the JSON document with AccessKeyId, SecretAccessKey, and SessionToken values?
Answer Description
IMDSv1 is reachable only at the link-local address 169.254.169.254. To obtain temporary AWS credentials, you must query the iam/security-credentials endpoint with the instance's IAM role name appended. The parent path /latest/meta-data/iam/security-credentials/ merely lists the role names; the instance-identity document and user-data endpoints do not contain credentials, and the RabbitMQ URI is unrelated to AWS metadata.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is IMDSv1 and why is it important in cloud environments?
What is SSRF and how does it work in exploiting services like IMDSv1?
How does IAM role assignment impact the data retrieved from the IMDSv1 endpoint?
What is IMDSv1, and how does it differ from IMDSv2?
What is the IAM role mentioned in accessing the /latest/meta-data/iam/security-credentials?<role-name> endpoint?
What is Server-Side Request Forgery (SSRF), and why is it relevant to AWS IMDS exploitation?
During a red-team engagement, your goal is to overwhelm a target's Internet link while having only a small uplink yourself. You decide to send forged 60-byte UDP queries to publicly accessible NTP servers so they reply with kilobytes of data toward the victim's IP address. Which DoS/DDoS attack technique are you preparing to use?
Executing a Slowloris slow-header attack against the NTP control interface
Launching an NTP amplification attack that abuses the monlist command
Triggering a teardrop fragmentation attack to crash the victim's TCP/IP stack
Sending a TCP SYN flood aimed at port 123/UDP on the victim
Answer Description
The scenario describes an amplification-based distributed denial-of-service technique. By spoofing the victim's IP address in very small Network Time Protocol (NTP) monlist requests, the attacker coerces many NTP servers to send much larger replies to the victim, producing an amplification ratio often exceeding 200×. This quickly saturates the victim's bandwidth even though the attacker transmits relatively little traffic. A TCP SYN flood and teardrop fragmentation rely on consuming state or exploiting reassembly bugs, not on reflection or amplification. Slowloris keeps HTTP sessions open with partial headers, which targets web servers and consumes their connection pools rather than amplifying traffic volume. Therefore, the only option matching the described UDP reflection and amplification behavior is the NTP amplification attack that abuses the monlist command.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an NTP amplification attack?
What is NTP and what does the monlist command do?
How does spoofing work in DDoS attacks like NTP amplification?
During an internal security assessment you are allowed to run only active tests that will not disrupt production. To identify any workstations on a switched Ethernet segment that have their network cards set to promiscuous (sniffer) mode, you transmit a single Ethernet frame carrying an ARP request that lists the suspected host's IP address but sets the frame's destination MAC to 00:11:22:33:44:55-an address that does not belong to any device on the segment and is not the broadcast address. Which observation would confirm that the workstation is operating in promiscuous mode?
The switch's CAM table briefly overflows and the uplink port shows a spike in traffic from multiple VLANs.
Repeated 802.1X EAP authentication failures are logged on the switch port connected to the workstation.
The workstation ignores the request but later sends a gratuitous ARP advertising its MAC for the same IP address.
The workstation replies with a valid ARP response even though the request's Layer-2 destination MAC does not match its own or the broadcast address.
Answer Description
In normal (non-promiscuous) operation, a NIC drops any Ethernet frame whose destination MAC address is neither its own nor a broadcast/multicast address. By crafting an ARP request that contains the correct target IP but an unrelated unicast destination MAC, you ensure that only a NIC running in promiscuous mode will pass the frame up the network stack to the ARP process. If the target still generates a valid ARP reply, it proves that the interface accepted and processed a frame not addressed to it, confirming promiscuous-mode operation. The other choices describe behaviors that can occur for legitimate reasons or that are unrelated to sniffing detection, so they are not reliable indicators.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is promiscuous mode in a NIC?
What is an ARP request and how does it work?
Why does the Layer-2 MAC address mismatch matter in this scenario?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.