Which of the following activities should be performed to prevent uploaded web shells from being exploited by others?
Secure Data Destruction:
Securely deleting the web shell ensures it cannot be accessed or exploited by attackers in the future.
This involves removing the malicious file and overwriting the space it occupied to prevent recovery.
Why Not Other Options?
A (Remove persistence mechanisms): While helpful in maintaining security, this doesn't address the immediate threat of the web shell.
B (Spin down infrastructure): This could disrupt operations and doesn't directly mitigate the web shell issue.
C (Preserve artifacts): While necessary for forensic analysis, it does not prevent further exploitation of the web shell.
CompTIA Pentest+ Reference:
Domain 3.0 (Attacks and Exploits)
Natalie
4 months agoAntonette
5 months agoMelda
5 months agoVincent
5 months agoKaitlyn
5 months agoDestiny
6 months agoAvery
6 months agoChantell
6 months agoHubert
6 months agoDarrel
6 months agoAide
6 months agoKrystal
6 months agoMirta
6 months agoCarey
6 months agoCordelia
1 year agoIsaiah
1 year agoVelda
1 year agoStevie
1 year agoOdelia
1 year agoJannette
1 year agoWillis
1 year agoBelen
1 year agoGilbert
1 year agoMarti
1 year agoThurman
1 year agoJohnathon
1 year agoRasheeda
1 year agoShawn
1 year agoAdrianna
1 year agoAlonzo
1 year agoStefania
1 year ago