After the exploitation phase, it is necessary to maintain a foothold in a compromised system to perform additional tasks. Which way could maintain persistence?
- performing ARP scans and ping sweeps
- performing additional enumeration of users, groups, forests, sensitive data, and unencrypted files
- creating a bind or reverse shell
- using local system tools
Explanation & Hint: After the exploitation phase, it is necessary to maintain a foothold in a compromised system to perform additional tasks, such as installing and modifying services to connect back to the compromised system. The persistence of a compromised system can be maintained in several ways, including the following:
|