14A: System Hacking Flashcards
3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
1
Q
Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.
A
command and control (c2)
2
Q
A cross-platform software development framework, previously called .NET Core, and the successor of the .NET Framework.
A
.NET
3
Q
A C2 framework focused on PowerShell. It has many post-exploitation tools but it is no longer maintained.
A
Empire
4
Q
A C2 framework built on .NET so its cross platform.
A
Covenant
5
Q
A cross platform C2 framework with a growing arsenal, including very useful macOS payloads like Apfell.
A
Mythic