0% found this document useful (0 votes)
58 views

lab2

Uploaded by

Wilson Quek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

lab2

Uploaded by

Wilson Quek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

1/3/25, 1:59 AM labclient.labondemand.

com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a

03: Assisted Lab: Performing Social Engineering using SET


PenTest+ (PT0-002) 2022 Update

10/10
Congratulations, you passed!
Duration: 39 minutes, 26 seconds

 Use a script to confirm the existence of /root/.set/payload.exe on Kali Score: 1


When the handler is reported as started, select the Score button to validate this task.
Path found ...
Listener detected ...
Task complete

 Use a script to confirm the existence of /var/www/html/acctupd.zip on Kali Score: 1


Select the Score button to validate this task.
Download active ...
Task complete

 Check sendmail Score: 1


Select the Score button to validate this task:
Recipient confirmed as [email protected] ...
Sender confirmed as [email protected] ...
Task complete

 Verify listener connection Score: 1


Select the Score button to validate this task:
Handler active ...
Task complete

 What is the Computer name displayed by this meterpreter command in the box Score: 1
below?

MS10

Congratulations, you have answered the question correctly.

 Which of the following attack types is NOT supported by SET? Score: 1

Arduino-based
Wireless
Spear phishing
SQL Injection

https://labclient.labondemand.com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a 1/2
1/3/25, 1:59 AM labclient.labondemand.com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a

Powershell

Congratulations, you have answered the question correctly.

 Which security framework does SET use to set up listeners? Score: 1

Arachni
Metasploit
SMTP binder
Maltego

Congratulations, you have answered the question correctly.

 The most commonly used features of SET are spear phishing, website spoofing, Score: 1
payload delivery, and mass mailer attacks. True or False?

True
False
Congratulations, you have answered the question correctly.

 What is the primary limitation or restriction in compromising a victim through a SET- Score: 1
crafted email and related exploit script/payload?
Client-side security blocking execution
Server keyword filtering
Firewall blocking email messages with attachments
NAT traversal

Congratulations, you have answered the question correctly.

 Which of the following are true in regard to using SET? (Select all that apply) Score: 1

SET emails can use spoofed source addresses


SET emails must be from a trusted email domain
SET payloads are allow-listed in most security filters
SET can send messages to a single address or a large group of addresses
SET can send attachments or hyperlinks to malicious scripts or payloads
SET demonstrates the power of combining technology with social engineering

Congratulations, you have answered the question correctly.

https://labclient.labondemand.com/Instructions/ExamResult/ac8e5691-1832-4758-bc59-b31d7170854a 2/2

You might also like