During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account. How can this weakness be exploited to access the system?

QuestionsCategory: 312-50V9During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account. How can this weakness be exploited to access the system?
Admin Staff asked 6 months ago
During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local
System account. How can this weakness be exploited to access the system?

A. Using the Metasploit psexec module setting the SA / Admin credential

B. Invoking the stored procedure xp_shell to spawn a Windows command shell

C. Invoking the stored procedure cmd_shell to spawn a Windows command shell

D. Invoking the stored procedure xp_cmdshell to spawn a Windows command shell








 

Suggested Answer: D





This question is in 312-50V9 EC-Council Certified Ethical Hacker v9 Exam
For getting EC-Council Certified Ethical Hacker (CEH) Certificate







Disclaimers:
The website is not related to, affiliated with, endorsed or authorized by EC-Council. 
Trademarks, certification & product names are used for reference only and belong to EC-Council.
The website does not contain actual questions and answers from EC-Council's Certification Exams.

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.