After establishing a shell on a target system, Joe, a penetration tester is aware that his actions have not been detected. He now wants to maintain persistent access to the machine. Which of the following methods would be MOST easily detected?
A) Run a zero-day exploit.
B) Create a new domain user with a known password.
C) Modify a known boot time service to instantiate a call back.
D) Obtain cleartext credentials of the compromised user.
Correct Answer:
Verified
Q62: During an internal penetration test, several multicast
Q63: A tester has determined that null sessions
Q64: A penetration tester runs the following from
Q65: A consultant is performing a social engineering
Q66: Joe, an attacker, intends to transfer funds
Q68: During a penetration test, a tester runs
Q69: Given the following: http://example.com/download.php?id-.../.../.../etc/passwd Which of the
Q70: A tester intends to run the following
Q71: Joe, a penetration tester, has received basic
Q72: A recently concluded penetration test revealed that
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents