8A: Avoid Detection Flashcards
2.2 Given a scenario, perform active reconnaissance. 3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
General term for the collected protocols, policies, and hardware that authenticate and authorize access to a network at the device level.
NAC
Attack where the threat actor makes an independent connection between two victims and is able to read and possibly modify traffic (AKA mitm attack).
on-path attack
Exploit techniques that use standard system tools and packages to perform intrusions.
living-off-the-land (LoTL)
4 LoTL tools
- Powershell
- WMI
- VBScript
- mimikatz
Method to clear logs using Meterpreter.
clearev
Method to clear logs in Windows CLI.
wevtutil
Method to clear logs in Linux.
echo “” > /var/log/syslog
A tool in Metasploit that allows you to delete or modify timestamp-related information on files.
TimeStomp
A method of covering your tracks by setting the command history to zero before executing the commands in a Bash shell.
export HISTSIZE=0