Which of the following activities should be performed to prevent uploaded web shells from being exploited by others?
Secure Data Destruction:
Securely deleting the web shell ensures it cannot be accessed or exploited by attackers in the future.
This involves removing the malicious file and overwriting the space it occupied to prevent recovery.
Why Not Other Options?
A (Remove persistence mechanisms): While helpful in maintaining security, this doesn't address the immediate threat of the web shell.
B (Spin down infrastructure): This could disrupt operations and doesn't directly mitigate the web shell issue.
C (Preserve artifacts): While necessary for forensic analysis, it does not prevent further exploitation of the web shell.
CompTIA Pentest+ Reference:
Domain 3.0 (Attacks and Exploits)
Natalie
3 months agoAntonette
3 months agoMelda
3 months agoVincent
4 months agoKaitlyn
4 months agoDestiny
4 months agoAvery
4 months agoChantell
4 months agoHubert
5 months agoDarrel
5 months agoAide
5 months agoKrystal
5 months agoMirta
5 months agoCarey
5 months agoCordelia
12 months agoIsaiah
12 months agoVelda
12 months agoStevie
1 year agoOdelia
1 year agoJannette
11 months agoWillis
12 months agoBelen
1 year agoGilbert
1 year agoMarti
11 months agoThurman
11 months agoJohnathon
12 months agoRasheeda
12 months agoShawn
1 year agoAdrianna
1 year agoAlonzo
1 year agoStefania
1 year ago