Maintaining Access Practice
Explore persistence, lateral movement, and staying in control of compromised assets in a controlled way.
1. Question
Which action BEST represents maintaining access after an initial compromise?
2. Question
In a controlled engagement, why might a tester avoid deploying advanced rootkits for persistence?
3. Question
Which of the following is a SAFE and ETHICAL way to demonstrate maintaining access?
4. Question
Why is it important to coordinate with the client before leaving any persistent access mechanisms in place during testing?
5. Question
Lateral movement between systems after initial compromise is MOST closely associated with:
6. Question
Which of the following BEST illustrates a 'command and control' (C2) channel?
7. Question
In a red team style assessment, why might an operator prefer 'living off the land' techniques?
8. Question
From a defensive perspective, which log data is MOST likely to reveal attempts at maintaining access?
9. Question
During a pentest, when should any persistent access you have established be removed?
10. Question
Which of the following is the BEST reason to demonstrate maintaining access in a report?