Section 17: Detection Avoidance Flashcards

1
Q

Command to create a windows user and add it to an admin group

A

net user /add hacked Hacked123

net localgroup administrators hacked /add

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Code Injection

A

Exploit technique that runs malicious code with the identification number of a legitimate process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Masquerading

A

Occurs when the dropper replaces a genuine executable with a malicious one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stream Editor (SED)

A

Has the ability to search, find, delete, replace, insert, or edit anything inside of a file without the need to open that file
▪ sed -i ‘malware’ /var/log/auth.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Commands to erase history

A

Bash (erase history)
● echo “ ” > ~.bash_history
history -c

PowerShell
● Clear-History

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Empire

A

A C2 framework that uses PowerShell for common post exploitation tasks
▪ github.com/bc-security/empire
▪ Nowadays, most Empire tools and techniques can be detected by
antivirus tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BloodHound

A

A tool used to explore Active Directory trust relationships and abuse rights on AD objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly