Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 113 Topic 12 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 113 Topic 12 Discussion

312-50v13 Exam Topic 12 Question 113 Discussion:
Question #: 113
Topic #: 12

During a penetration test for a U.S.-based retail company, John gains access to a secondary server that responds unusually to structured queries. By sending a specially crafted request, he receives a full list of subdomains, MX records, and aliases belonging to the target organization. The response exposes sensitive internal mappings that could be leveraged for further attacks.

Which tool was MOST likely used to perform this enumeration?


A.

smtp-user-enum.pl -u user -t host


B.

ldapsearch -h -x


C.

nbtstat -A


D.

dig @server axfr


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.