16C: Maintain Persistence Flashcards

3.7 Given a scenario, perform post-exploitation techniques.

1
Q

In cybersecurity, the ability of a threat actor to maintain covert access to a target host or network.

A

persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A class of malware that modifies system files, often at the kernel level, to conceal its presence.

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This occurs when the target system “binds” its shell to a local network port, and an attacker’s shell communicates with it.

A

bind shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A maliciously spawned remote command shell where the victim host opens the connection to the attacking host.

A

reverse shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A scheduled task that is managed by the Linux cron daemon.

A

cron job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Any instance of execution, such as the initiation of a process or running of a script, that the system performs on a set schedule.

A

scheduled task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly