8C: Establish a Covert Chanel Flashcards
3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
1
Q
The process by which an attacker takes data that is stored inside of a private network and moves it to an external network.
A
Data Exfiltration
2
Q
A Windows-based remote access service that doesn’t require setup on the host being accessed remotely. Also this is a lightweight program that is part of the Sysinternals suite that provides interactivity for CLI programs.This tool uses Server Message Block (SMB) to issue commands to a remote system without having to manually install client software.
While this tool is a convenient option for network administrators, this tool can be used along with Mimikatz to allow a malicious actor to move laterally within a system and issue commands
A
PsExec