8C: Establish a Covert Chanel Flashcards

3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.

1
Q

The process by which an attacker takes data that is stored inside of a private network and moves it to an external network.

A

Data Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Windows-based remote access service that doesn’t require setup on the host being accessed remotely. Also this is a lightweight program that is part of the Sysinternals suite that provides interactivity for CLI programs.This tool uses Server Message Block (SMB) to issue commands to a remote system without having to manually install client software.
While this tool is a convenient option for network administrators, this tool can be used along with Mimikatz to allow a malicious actor to move laterally within a system and issue commands

A

PsExec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly