Which of the following post-exploitation activities allows a penetration tester to maintain persistent access in a compromised system?
Maintaining persistent access in a compromised system is a crucial goal for a penetration tester after achieving initial access. Here's an explanation of each option and why creating registry keys is the preferred method:
Creating registry keys (Answer: A):
Advantages: This method is stealthy and can be effective in maintaining access over long periods, especially on Windows systems.
Example: Adding a new entry to the HKLMSoftwareMicrosoftWindowsCurrentVersionRun registry key to execute a malicious script upon system boot.
Drawbacks: This method is less stealthy and can be easily detected by network monitoring tools. It also requires an open port, which might be closed or filtered by firewalls.
Executing a process injection (Option C):
Drawbacks: While effective for evading detection, it doesn't inherently provide persistence. The injected code will typically be lost when the process terminates or the system reboots.
Setting up a reverse SSH connection (Option D):
Drawbacks: This method can be useful for maintaining a session but is less reliable for long-term persistence. It can be disrupted by network changes or monitoring tools.
Conclusion: Creating registry keys is the most effective method for maintaining persistent access in a compromised system, particularly in Windows environments, due to its stealthiness and reliability.
Installing a bind shell (Option B):
Bette
4 months agoLindsay
5 months agoAlbert
5 months agoLouann
5 months agoKaycee
5 months agoAriel
6 months agoAnnalee
6 months agoPhyliss
6 months agoAlpha
6 months agoAfton
6 months agoStevie
6 months agoDorcas
6 months agoMari
6 months agoBen
6 months agoBarb
6 months agoHannah
1 year agoJuan
1 year agoIvette
1 year agoVeronika
1 year agoIra
1 year agoCarrol
1 year agoStaci
1 year agoViva
2 years agoNicolette
2 years agoBuffy
1 year agoSoledad
1 year agoPhuong
1 year agoDorothy
2 years agoLucina
2 years agoTula
1 year agoLilli
1 year agoGregoria
1 year agoTien
2 years agoLayla
1 year agoFrancine
1 year agoLeontine
1 year agoDean
2 years agoJudy
2 years agoArlyne
1 year agoStefania
2 years agoStefania
2 years agoMagnolia
2 years agoJosephine
2 years agoMertie
2 years agoKenneth
2 years agoEdmond
2 years agoKing
2 years agoLavina
2 years ago