A threat actor has identified the potential vulnerability of the web server of an organization and is building an attack. What will the threat actor possibly do to build an attack weapon?
- Collect credentials of the web server developers and administrators.
- Install a webshell on the web server for persistent access.
- Obtain an automated tool in order to deliver the malware payload through the vulnerability.
- Create a point of persistence by adding services.
Explanation & Hint:
Obtain an automated tool in order to deliver the malware payload through the vulnerability. This step is typically one of the first in the exploitation phase of an attack. Automated tools can exploit known vulnerabilities quickly and efficiently. Once the vulnerability is exploited and the attacker has gained entry into the system, they may then proceed to install web shells for persistent access or create points of persistence by adding services, and potentially collect credentials to further their access and control within the network. |