14A: System Hacking Flashcards

3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.

1
Q

Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.

A

command and control (c2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A cross-platform software development framework, previously called .NET Core, and the successor of the .NET Framework.

A

.NET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A C2 framework focused on PowerShell. It has many post-exploitation tools but it is no longer maintained.

A

Empire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A C2 framework built on .NET so its cross platform.

A

Covenant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cross platform C2 framework with a growing arsenal, including very useful macOS payloads like Apfell.

A

Mythic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly