Which of the following post-exploitation activities allows a penetration tester to maintain persistent access in a compromised system?
Maintaining persistent access in a compromised system is a crucial goal for a penetration tester after achieving initial access. Here's an explanation of each option and why creating registry keys is the preferred method:
Creating registry keys (Answer: A):
Advantages: This method is stealthy and can be effective in maintaining access over long periods, especially on Windows systems.
Example: Adding a new entry to the HKLMSoftwareMicrosoftWindowsCurrentVersionRun registry key to execute a malicious script upon system boot.
Drawbacks: This method is less stealthy and can be easily detected by network monitoring tools. It also requires an open port, which might be closed or filtered by firewalls.
Executing a process injection (Option C):
Drawbacks: While effective for evading detection, it doesn't inherently provide persistence. The injected code will typically be lost when the process terminates or the system reboots.
Setting up a reverse SSH connection (Option D):
Drawbacks: This method can be useful for maintaining a session but is less reliable for long-term persistence. It can be disrupted by network changes or monitoring tools.
Conclusion: Creating registry keys is the most effective method for maintaining persistent access in a compromised system, particularly in Windows environments, due to its stealthiness and reliability.
Installing a bind shell (Option B):
Bette
3 months agoLindsay
3 months agoAlbert
3 months agoLouann
4 months agoKaycee
4 months agoAriel
4 months agoAnnalee
4 months agoPhyliss
4 months agoAlpha
5 months agoAfton
5 months agoStevie
5 months agoDorcas
5 months agoMari
5 months agoBen
5 months agoBarb
5 months agoHannah
1 year agoJuan
1 year agoIvette
1 year agoVeronika
1 year agoIra
1 year agoCarrol
1 year agoStaci
1 year agoViva
1 year agoNicolette
1 year agoBuffy
1 year agoSoledad
1 year agoPhuong
1 year agoDorothy
1 year agoLucina
1 year agoTula
1 year agoLilli
1 year agoGregoria
1 year agoTien
1 year agoLayla
1 year agoFrancine
1 year agoLeontine
1 year agoDean
1 year agoJudy
1 year agoArlyne
1 year agoStefania
1 year agoStefania
1 year agoMagnolia
1 year agoJosephine
1 year agoMertie
1 year agoKenneth
1 year agoEdmond
1 year agoKing
1 year agoLavina
1 year ago