After the exploitation phase, it is necessary to maintain a foothold in a compromised system to perform additional tasks. Which way could maintain persistence?

IT Questions BankCategory: Ethical HackerAfter the exploitation phase, it is necessary to maintain a foothold in a compromised system to perform additional tasks. Which way could maintain persistence?

After the exploitation phase, it is necessary to maintain a foothold in a compromised system to perform additional tasks. Which way could maintain persistence?

  • performing ARP scans and ping sweeps
  • performing additional enumeration of users, groups, forests, sensitive data, and unencrypted files
  • creating a bind or reverse shell
  • using local system tools

Explanation: After the exploitation phase, it is necessary to maintain a foothold in a compromised system to perform additional tasks, such as installing and modifying services to connect back to the compromised system. The persistence of a compromised system can be maintained in several ways, including the following:

  • creating a bind or reverse shell
  • creating and manipulating scheduled jobs and tasks
  • creating custom daemons and processes
  • creating new users

Exam with this question: 8.3.3 Quiz - Performing Post-Exploitation Techniques Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments