16B: Move Throughout the System Flashcards

3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.

1
Q

The techniques performed after the initial attack, such as lateral movement and persistence.

A

post exploitation activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process by which an attacker is able to move from one part of a computing environment to another.

A

lateral movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly