Penetration Testing for Username Harvesting and Social Engineering | CompTIA Security+

Username Harvesting and Social Engineering

Prev Question Next Question

Question

A penetration tester harvests potential usernames from a social networking site.

The penetration tester then uses social engineering to attempt to obtain associated passwords to gain unauthorized access to shares on a network server.

Which of the following methods is the penetration tester MOST likely using?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

The method the penetration tester is most likely using is "social engineering."

Social engineering is the act of manipulating individuals into divulging confidential information that can be used to access unauthorized systems or networks. In this case, the tester has harvested potential usernames from a social networking site and is attempting to obtain associated passwords through social engineering.

The other options listed are not the most likely methods being used by the penetration tester:

A. Escalation of privilege refers to the process of gaining higher-level permissions on a system that are not normally available to the user. This may be a technique used after access has already been gained through another method, but it is not directly related to the act of harvesting usernames and attempting to obtain passwords.

B. SQL injection is a technique used to exploit a vulnerability in a web application to inject malicious SQL code into the application's database. This is not relevant to the scenario described in the question.

C. Active reconnaissance involves actively probing a network or system to gather information about its configuration, vulnerabilities, and potential attack surface. While this may be a technique used by the penetration tester before attempting social engineering, it is not directly related to the act of harvesting usernames and attempting to obtain passwords.

D. A proxy server is a server that acts as an intermediary between a client and another server. While this may be used as part of a larger attack, it is not directly related to the act of harvesting usernames and attempting to obtain passwords.

In conclusion, the most likely method being used by the penetration tester in this scenario is social engineering.