Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 150 Topic 16 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 150 Topic 16 Discussion

312-50v13 Exam Topic 16 Question 150 Discussion:
Question #: 150
Topic #: 16

During an internal red team engagement, an operator discovers that TCP port 389 is open on a target system identified as a domain controller. To assess the extent of LDAP exposure, the operator runs the command ldapsearch -h -x -s base namingcontexts and receives a response revealing the base distinguished name (DN): DC=internal,DC=corp. This naming context indicates the root of the LDAP directory structure. With this discovery, the operator plans the next step to continue LDAP enumeration and expand visibility into users and objects in the domain. What is the most logical next action?


A.

Launch a brute-force attack against user passwords via SMB


B.

Conduct an ARP scan on the local subnet


C.

Attempt an RDP login to the domain controller


D.

Use the base DN in a filter to enumerate directory objects


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.