Which C2 utility is a PowerShell-based tool that leverages WMI to create a C2 channel?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which C2 utility is a PowerShell-based tool that leverages WMI to create a C2 channel? Socat WMImplant WSC2 TrevorC2 Explanation & Hint: Many different techniques and utilities can be used…

Continue ReadingWhich C2 utility is a PowerShell-based tool that leverages WMI to create a C2 channel?

A cybersecurity student is learning about Netcat commands that could be used in a penetration testing engagement. The student wants to use Netcat as a port scanner. What command should be used?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A cybersecurity student is learning about Netcat commands that could be used in a penetration testing engagement. The student wants to use Netcat as a port scanner. What command should…

Continue ReadingA cybersecurity student is learning about Netcat commands that could be used in a penetration testing engagement. The student wants to use Netcat as a port scanner. What command should be used?

An attacking system has a listener (port open), and the victim initiates a connection back to the attacking system. What type of vulnerability does this situation describe?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

An attacking system has a listener (port open), and the victim initiates a connection back to the attacking system. What type of vulnerability does this situation describe? reverse shell horizontal…

Continue ReadingAn attacking system has a listener (port open), and the victim initiates a connection back to the attacking system. What type of vulnerability does this situation describe?

What is the main advantage of Remote Desktop over Sysinternals?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is the main advantage of Remote Desktop over Sysinternals? It can upload, execute, and interact with executables on compromised hosts. It can run commands revealing information about running processes,…

Continue ReadingWhat is the main advantage of Remote Desktop over Sysinternals?

What procedure should be deployed to protect the network against lateral movement?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What procedure should be deployed to protect the network against lateral movement? Database backups VPNs Strong passwords for user accounts VLANs Explanation & Hint: Lateral movement involves scanning a network…

Continue ReadingWhat procedure should be deployed to protect the network against lateral movement?

After compromising a system during a penetration testing engagement, all penetration work should be cleaned up, including extra files, system changes, and modified logs. The media sanitation methodology should be discussed with the client and the owner of the affected systems. What document guides media sanitation?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

After compromising a system during a penetration testing engagement, all penetration work should be cleaned up, including extra files, system changes, and modified logs. The media sanitation methodology should be…

Continue ReadingAfter compromising a system during a penetration testing engagement, all penetration work should be cleaned up, including extra files, system changes, and modified logs. The media sanitation methodology should be discussed with the client and the owner of the affected systems. What document guides media sanitation?

What kind of malicious activity is performed by a lower-privileged user who accesses functions reserved for higher-privileged users?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What kind of malicious activity is performed by a lower-privileged user who accesses functions reserved for higher-privileged users? horizontal privilege escalation steganography bind shell vertical privilege escalation Explanation & Hint:…

Continue ReadingWhat kind of malicious activity is performed by a lower-privileged user who accesses functions reserved for higher-privileged users?

An attacker wants to allow further connections to a compromised system and maintain persistent access. The attacker uses the Windows system command Enable-PSRemoting -SkipNetworkProfileCheck – Force. What tool is being enabled using this command?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

An attacker wants to allow further connections to a compromised system and maintain persistent access. The attacker uses the Windows system command Enable-PSRemoting -SkipNetworkProfileCheck - Force. What tool is being…

Continue ReadingAn attacker wants to allow further connections to a compromised system and maintain persistent access. The attacker uses the Windows system command Enable-PSRemoting -SkipNetworkProfileCheck – Force. What tool is being enabled using this command?

Which three tools are living-off-the-land post-exploitation techniques? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which three tools are living-off-the-land post-exploitation techniques? (Choose three.) Twittor PowerSploit Socat WMImplant WinRM Empire Explanation & Hint: Some examples of living-off-the-land post-exploitation techniques are Empire, WMI, BloodHound, PowerShell, Sysinternals,…

Continue ReadingWhich three tools are living-off-the-land post-exploitation techniques? (Choose three.)

Which Sysinternals tool is used by penetration testers to modify Windows registry values and connect a compromised system to another system?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which Sysinternals tool is used by penetration testers to modify Windows registry values and connect a compromised system to another system? PsInfo PsLoggedOn PsGetSid PsExec Explanation & Hint: PsExec is…

Continue ReadingWhich Sysinternals tool is used by penetration testers to modify Windows registry values and connect a compromised system to another system?

Which utility can be used to write scripts or applications to automate administrative tasks on remote computers and can also be used by malware to perform different activities in a compromised system?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which utility can be used to write scripts or applications to automate administrative tasks on remote computers and can also be used by malware to perform different activities in a…

Continue ReadingWhich utility can be used to write scripts or applications to automate administrative tasks on remote computers and can also be used by malware to perform different activities in a compromised system?

Which resource is a single-page JavaScript web application that can be used to find complex attack paths in Microsoft Azure?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which resource is a single-page JavaScript web application that can be used to find complex attack paths in Microsoft Azure? Empire Netcat BloodHound Sysinternals Explanation & Hint: BloodHound is a…

Continue ReadingWhich resource is a single-page JavaScript web application that can be used to find complex attack paths in Microsoft Azure?

Which resource is an open-source framework that allows rapid deployment of post-exploitation modules, including keyloggers, bind and reverse shells, and adaptable communication to evade detection?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which resource is an open-source framework that allows rapid deployment of post-exploitation modules, including keyloggers, bind and reverse shells, and adaptable communication to evade detection? BloodHound Sysinternals WMI Empire Explanation…

Continue ReadingWhich resource is an open-source framework that allows rapid deployment of post-exploitation modules, including keyloggers, bind and reverse shells, and adaptable communication to evade detection?

Which living-off-the-land post-exploitation technique can get directory listings, copy and move files, get a list of running processes, and perform administrative tasks?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which living-off-the-land post-exploitation technique can get directory listings, copy and move files, get a list of running processes, and perform administrative tasks? PowerShell Sysinternals WMI BloodHound Explanation & Hint: PowerShell…

Continue ReadingWhich living-off-the-land post-exploitation technique can get directory listings, copy and move files, get a list of running processes, and perform administrative tasks?

What kind of channel is created by a C2 with a system that has been compromised?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What kind of channel is created by a C2 with a system that has been compromised? wireless channel encrypted channel covert channel command channel Explanation & Hint: A C2 creates…

Continue ReadingWhat kind of channel is created by a C2 with a system that has been compromised?

Which Meterpreter command is used to execute Meterpreter commands that are listed inside a text file and also to help accelerate the actions taken on the victim system?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which Meterpreter command is used to execute Meterpreter commands that are listed inside a text file and also to help accelerate the actions taken on the victim system? search execute…

Continue ReadingWhich Meterpreter command is used to execute Meterpreter commands that are listed inside a text file and also to help accelerate the actions taken on the victim system?

A cybersecurity student is learning about Netcat commands that could be used in a penetration testing engagement. Which Netcat command is used to connect to a TCP port?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A cybersecurity student is learning about Netcat commands that could be used in a penetration testing engagement. Which Netcat command is used to connect to a TCP port? nc -nv <IP…

Continue ReadingA cybersecurity student is learning about Netcat commands that could be used in a penetration testing engagement. Which Netcat command is used to connect to a TCP port?