Q: 20
[Information Gathering and Vulnerability Scanning] During a penetration test, the tester uses a vulnerability scanner to collect information about any possible vulnerabilities that could be used to compromise the network. The tester receives the results and then executes the following command:
snmpwalk -v 2c -c public 192.168.1.23
Which of the following is the tester trying to do based on the command they used?
Options
Discussion
D . Running snmpwalk right after a scan is classic for checking if a vulnerability is legit, especially with that public community string. It's not exploiting, just confirming the finding. Makes sense to me-anyone see it differently?
Option D not C. Using snmpwalk here is about checking the vulnerability flagged in the scan, not exploiting it.
Looks like C to me. Running snmpwalk feels like actively trying to exploit SNMP with default creds. I'd think that's scripting an exploit for access, not just validation. Maybe I'm missing something, but that's how I'd read it.
Its D, the command is validating if the scanner finding is real or a false alarm. Clear scenario.
Be respectful. No spam.