Which of the following activities should be performed to prevent uploaded web shells from being exploited by others?
Secure Data Destruction:
Securely deleting the web shell ensures it cannot be accessed or exploited by attackers in the future.
This involves removing the malicious file and overwriting the space it occupied to prevent recovery.
Why Not Other Options?
A (Remove persistence mechanisms): While helpful in maintaining security, this doesn't address the immediate threat of the web shell.
B (Spin down infrastructure): This could disrupt operations and doesn't directly mitigate the web shell issue.
C (Preserve artifacts): While necessary for forensic analysis, it does not prevent further exploitation of the web shell.
CompTIA Pentest+ Reference:
Domain 3.0 (Attacks and Exploits)
Cordelia
2 months agoIsaiah
1 months agoVelda
1 months agoStevie
2 months agoOdelia
2 months agoJannette
1 months agoWillis
1 months agoBelen
2 months agoGilbert
2 months agoMarti
1 months agoThurman
1 months agoJohnathon
1 months agoRasheeda
2 months agoShawn
2 months agoAdrianna
2 months agoAlonzo
2 months agoStefania
2 months ago