8A: Avoid Detection Flashcards

2.2 Given a scenario, perform active reconnaissance. 3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.

1
Q

General term for the collected protocols, policies, and hardware that authenticate and authorize access to a network at the device level.

A

NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack where the threat actor makes an independent connection between two victims and is able to read and possibly modify traffic (AKA mitm attack).

A

on-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exploit techniques that use standard system tools and packages to perform intrusions.

A

living-off-the-land (LoTL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 LoTL tools

A
  1. Powershell
  2. WMI
  3. VBScript
  4. mimikatz
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Method to clear logs using Meterpreter.

A

clearev

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Method to clear logs in Windows CLI.

A

wevtutil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Method to clear logs in Linux.

A

echo “” > /var/log/syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A tool in Metasploit that allows you to delete or modify timestamp-related information on files.

A

TimeStomp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A method of covering your tracks by setting the command history to zero before executing the commands in a Bash shell.

A

export HISTSIZE=0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly