A penetration tester opened a reverse shell on a Linux web server and successfully escalated privileges to root. During the engagement, the tester noticed that another user logged in frequently as root to perform work tasks. To avoid disrupting this user’s work, which of the following is the BEST option for the penetration tester to maintain root-level persistence on this server during the test?
Asq1400
5Â months, 1Â week agoEtc_Shadow28000
10Â months, 1Â week ago041ba31
1Â year, 1Â month agovazq77
1Â year, 4Â months agolordguck
1Â year, 5Â months ago[Removed]
1Â year, 5Â months agoEtc_Shadow28000
10Â months, 1Â week agomatheusfmartins
1Â year, 9Â months agokips
1Â year, 9Â months ago[Removed]
2Â years agocy_analyst
2Â years, 1Â month agoKingIT_ENG
2Â years, 1Â month ago[Removed]
2Â years, 1Â month ago[Removed]
2Â years, 1Â month agonickwen007
2Â years, 2Â months ago[Removed]
2Â years, 1Â month agozimuz
2Â years, 2Â months agohakanay
1Â year, 5Â months agokloug
2Â years, 2Â months ago