A penetration tester has obtained root access to a Linux-based file server and would like to maintain persistence after reboot. Which of the following techniques would BEST support this objective?
A.
Create a one-shot system service to establish a reverse shell
B.
Obtain /etc/shadow and brute force the root password.
C.
Run the nc ג€"e /bin/sh <ג€¦> command
D.
Move laterally to create a user account on LDAP
Maintaining persistence on a system generally involves ensuring that access can be re-established after a reboot or other interruption. Among the options provided, the one that would BEST support the objective of maintaining persistence after reboot is:
A. Create a one-shot system service to establish a reverse shell
The answer is A. Create a one-shot system service to establish a reverse shell. By creating a one-shot system service, the penetration tester can set up a reverse shell that will re-establish itself after each reboot, providing a persistent connection back to their machine.
A one-shot system is a type of service that will only run once, usually to perform a specific task such as setting up a reverse shell or downloading a malicious file. This can be used by a penetration tester to maintain persistence after rebooting a system, or by an adversary to gain unauthorized access to a system.
A one-shot system is a type of service that will only run once, usually to perform a specific task such as setting up a reverse shell or downloading a malicious file. This can be used by a penetration tester to maintain persistence after rebooting a system, or by an adversary to gain unauthorized access to a system.
The answer is A. Create a one-shot system service to establish a reverse shell. By creating a one-shot system service, the penetration tester can set up a reverse shell that will re-establish itself after each reboot, providing a persistent connection back to their machine.
The BEST option that would support the objective of maintaining persistence after reboot would be Option A: Create a one-shot system service to establish a reverse shell. This option allows the penetration tester to execute a command that will establish a reverse shell connection back to their machine after the file server is rebooted.
Option B: Obtain /etc/shadow and brute force the root password is incorrect because it does not provide the capability to maintain persistence after reboot.
Option C: Run the nc ג€"e /bin/sh <ג€¦> command is incorrect because it does not provide a way to maintain persistence after reboot.
Option D: Move laterally to create a user account on LDAP is incorrect because it does not provide a way to maintain persistence after reboot.
upvoted 4 times
...
This section is not available anymore. Please use the main Exam Page.PT0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ryanzou
Highly Voted 1 year, 7 months agosolutionz
Most Recent 9 months agonickwen007
1 year, 1 month agonickwen007
1 year, 2 months agonickwen007
1 year, 2 months agokloug
1 year, 2 months ago[Removed]
1 year, 2 months ago2Fish
1 year, 3 months agoNotAHackerJustYet
1 year, 3 months ago