List of questions
Related questions
Question 55 - PT0-002 discussion
A penetration tester has obtained root access to a Linux-based file server and would like to maintain persistence after reboot. Which of the following techniques would BEST support this objective?
A.
Create a one-shot system service to establish a reverse shell.
B.
Obtain /etc/shadow and brute force the root password.
C.
Run the nc -e /bin/sh <...> command.
D.
Move laterally to create a user account on LDAP
Your answer:
0 comments
Sorted by
Leave a comment first