Welcome to this CEH v13 practice test!

This practice test covers Domain 3 (System Hacking Phases and Attack Techniques) Subdomain 2 (System Hacking) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 3.2 Practice Test 001
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 3: System Hacking Phases and Attack Techniques — Sub-Domain 3.2: System Hacking
Question 1
During a penetration test, a tester captures the following hash from a Windows target's SAM database: `aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0`. The tester recognizes this immediately without running any cracking tool. What does this hash indicate?
    Question 2
    Clark, a professional hacker, has gained a low-privileged shell on a Windows Server 2019 system. He runs the command `whoami /priv` and notices that the `SeImpersonatePrivilege` token is enabled for his current user context. Clark decides to leverage this finding to escalate his privileges to SYSTEM level. Which attack technique is Clark most likely preparing to execute?
      Question 3
      Select all that apply
      A penetration tester has compromised a Linux host and wants to establish persistence without creating a new user account or modifying `/etc/passwd`. The tester wants the backdoor to survive reboots and remain hidden from a basic process listing. Which TWO of the following techniques would best achieve this goal? (Choose two)
        Question 4
        Jane is conducting a black-box penetration test against a Windows Active Directory environment. After gaining initial access, she uses Mimikatz and runs the command `sekurlsa::logonpasswords`. What is the primary purpose of this command, and from where does Mimikatz extract the credentials?
          Question 5
          During a penetration test, a tester uses the following Hashcat command against a captured hash file: `hashcat -m 1000 -a 3 hashes.txt ?u?l?l?l?d?d?d?d`. What attack mode and password pattern is this command targeting?
            Question 6
            Elijah, a malicious insider, wants to cover his tracks after exfiltrating sensitive files from a Linux server. He wants to remove evidence of his activity from system logs without completely deleting log files, which would itself raise suspicion. Which of the following commands would BEST help Elijah selectively remove entries related to his username `elijah` from the `/var/log/auth.log` file?
              Question 7
              A security analyst reviewing endpoint logs notices that a Windows service named `WindowsUpdateSvc32` was recently installed on several hosts. The service binary path points to `C:WindowsTempsvchost32.exe` and it is configured to start automatically. No legitimate Windows update service uses this name or path. What system hacking phase does this activity MOST likely represent?
                Question 8
                During a penetration test, a tester wants to perform online password cracking against an SSH service on a target at 192.168.10.50. The tester has a username list (`users.txt`) and a password list (`pass.txt`). Which tool and command syntax would be MOST appropriate for this task?
                  Question 9
                  Kevin is performing a post-exploitation assessment on a Windows domain-joined workstation. He wants to extract cached domain credentials stored locally so that users can log in even when the domain controller is unreachable. Kevin runs `lsadump::cache` in Mimikatz. What type of credentials does this module retrieve, and how are they protected?
                    Question 10
                    Select all that apply
                    An ethical hacker is performing a penetration test on a Windows environment and has obtained SYSTEM-level access on a workstation. She wants to dump credentials from the SAM database but notices that the SAM file is locked by the OS. Which technique would allow her to extract the SAM database contents while the system is running? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *