List of questions
Related questions
Question 44 - CAS-004 discussion
During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.
Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?
A.
Spawn a shell using sudo and an escape string such as sudo vim -c '!sh'.
B.
Perform ASIC password cracking on the host.
C.
Read the /etc/passwd file to extract the usernames.
D.
Initiate unquoted service path exploits.
E.
Use the UNION operator to extract the database schema.
Your answer:
0 comments
Sorted by
Leave a comment first