ClassQuiz
Play
Explore
Search
Docs
GitHub
Register
Log in
Donate
❤️
ClassQuiz
Play
Block 2 Theoretical Quiz 1
meow
Made by
@dodosenpai
0
0
0
70
Practice
Download
Report
What information is encrypted in a Authentication Request (AS-REQ)?
1: What information is encrypted in a Authentication Request (AS-REQ)?
999s
Ticket
Timestamp
Username
Password hash
Which step in the Kerberos process does Kerberoasting target?
2: Which step in the Kerberos process does Kerberoasting target?
999s
AS-REQ
AS-REP
TGS-REP
TGS-REQ
How can you Kerberoast without an account?
3: How can you Kerberoast without an account?
999s
By requesting a ST with a forged AS-REQ
By brute forcing SPNs
By requesting a ST with a TGT from ASRepRoasting
By adding a fake computer to the domain
Which kind of delegation allows the service to impersonate a user for any other service?
4: Which kind of delegation allows the service to impersonate a user for any other service?
999s
Resource-Based Constrained
Unconstrained
Constrained
All of the above
Which computer attribute is used for Constrained Delegation?
5: Which computer attribute is used for Constrained Delegation?
999s
SeEnableDelegationPrivilege
msDS-AllowedToActOnBehalfOfOtherIdentity
TRUSTED_FOR_DELEGATION
msDS-AllowedToDelegateTo
Why is protocol transition used for?
6: Why is protocol transition used for?
999s
To enable Unconstrained Delegation
To allow Kerberos services to use NTLM authentication
To impersonate a different user
To allow HTTP requests to access SQL servers
Which attack does coercing a DC to connect to a server with Unconstrained Delegation allow you to conduct?
7: Which attack does coercing a DC to connect to a server with Unconstrained Delegation allow you to conduct?
999s
DCSync
Silver Ticket
Golden Ticket
ExtraSIDs
A user has the TRUSTED_FOR_DELEGATION User Account Control attribute. Which attack can they conduct?
8: A user has the TRUSTED_FOR_DELEGATION User Account Control attribute. Which attack can they conduct?
999s
Unconstrained Delegation
Resource-Based Constrained Delegation
Constrained Delegation
Kerberoast
How can you exploit a user with the TRUSTED_FOR_DELEGATION UAC attribute?
9: How can you exploit a user with the TRUSTED_FOR_DELEGATION UAC attribute?
999s
By coercing a Domain Controller
By adding the DC to the delegation attribute
By creating a fake computer and registering an SPN
By creating a golden ticket
What information is contained in a AP-REQ?
10: What information is contained in a AP-REQ?
999s
A ST and an authenticator
A TGT and a ST
A TGT and an authenticator
A TGS-REQ and a TGT
Which of the following is an indicator of a kerberoasting attack?
11: Which of the following is an indicator of a kerberoasting attack?
999s
Fake username in the ticket
TGT Request
Ticket request for a RC4-HMAC encrypted ticket
10 year expiry of ticket
What is the Configuration Naming Context repository used for?
12: What is the Configuration Naming Context repository used for?
999s
NTLM relay attacks
Trust configuration information
Forest configuration information
Domain configuration information
What is an External Trust used for?
13: What is an External Trust used for?
999s
To allow users from one forest to access another forest
Allow users from a domain in one forest to access a domain in a separate forest
Allow users in a parent domain to access a child domain
Connect a windows domain to a non-windows domain
How can you attack trusts that have SID filtering enabled?
14: How can you attack trusts that have SID filtering enabled?
999s
By attacking DNS Trusts
By abusing ADCS
By attacking Configuration Naming Context
By using RIDs greater than 1000
How can you attack across a forest trust?
15: How can you attack across a forest trust?
999s
By abusing ADCS
By abusing Foreign Security Principals
By abusing GPOs
By abusing DNS Trusts
What is the default signing setting for SMB2 servers that aren't Domain Controllers?
16: What is the default signing setting for SMB2 servers that aren't Domain Controllers?
999s
Not Required
Enabled
Required
Disabled
Which of the following protocols can be used to relay to all other protocols regardless of vulnerability or signing?
17: Which of the following protocols can be used to relay to all other protocols regardless of vulnerability or signing?
999s
HTTP
SMB
LDAP
HTTPS
How does message signing prevent NTLM Relay attacks?
18: How does message signing prevent NTLM Relay attacks?
999s
Message Signing blocks network traffic
Message signing disables NTLM authentication
Message signing encrypts the packet
It allows the recipient to verify the source of the packet
How does the ESC8 AD CS attack work?
19: How does the ESC8 AD CS attack work?
999s
By relaying to an SMB server
By relaying to an SMB serverBy relaying to a HTTP certificate enrollment server
By relaying to a ICRP certificate enrollment server
By relaying to a RPC certificate enrollment server
What kind of Authentication Protocol is NTLMv1/2?
20: What kind of Authentication Protocol is NTLMv1/2?
999s
OTP
Static
Ticketing
Challenge-Response