Post Exploitation (Basics) Flashcards

1
Q

What is pivoting?

A

Pivoting is the action of moving from host to host through compromise. So in a network the attacker can obtain access to systems that are not directly accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main goal of a clean up following a pentester’s perpective?

A

The main goal is to leave the network the same as it was before you entered it, for example:
* Remove executables, scripts and any other added files;
* Remove added accounts;
* Set system and apps settings back to original configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main goal of a clean up following a hacker’s perspective?

A

The main goal is to make it look like you were never there. Delete your traces from log files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why can using Metasploit for persistence be dangerous?

A

Because it provides unauthenticated access that could be used by another user. It will open a port and leave it exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly