Notifications
Clear all
Topic starter
21/05/2022 10:38 am
A penetration tester obtained root access on a Windows server and, according to the rules of engagement, is permitted to perform post-exploitation for persistence.
Which of the following techniques would BEST support this?
- A . Configuring systemd services to run automatically at startup
- B . Creating a backdoor
- C . Exploiting an arbitrary code execution exploit
- D . Moving laterally to a more authoritative server/service
Suggested Answer: B