Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 190 Topic 20 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 190 Topic 20 Discussion

312-50v13 Exam Topic 20 Question 190 Discussion:
Question #: 190
Topic #: 20

During an internal red team engagement, an operator discovers that TCP port 389 is open on a target system identified as a domain controller. To assess the extent of LDAP exposure, the operator runs the command ldapsearch -h -x -s base namingcontexts and receives a response revealing the base distinguished name (DN): DC=internal,DC=corp. This naming context indicates the root of the LDAP directory structure. With this discovery, the operator plans the next step to continue LDAP enumeration and expand visibility into users and objects in the domain. What is the most logical next action?


A.

Launch a brute-force attack against user passwords via SMB


B.

Conduct an ARP scan on the local subnet


C.

Attempt an RDP login to the domain controller


D.

Use the base DN in a filter to enumerate directory objects


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.