Post-Exploitation and Lateral Movement
Maintain persistence, perform lateral movement, and document findings to support remediation efforts (14% of exam).
In the context of CompTIA PenTest+, Post-Exploitation and Lateral Movement are critical phases that occur immediately after initial system compromise. While Post-Exploitation focuses on the local machine, Lateral Movement focuses on the network. Post-Exploitation aims to stabilize the foothold and…
Concepts covered: Maintaining access and persistence, Persistence mechanisms, Registry persistence, Scheduled task persistence, Service creation for persistence, Startup folder persistence, Web shell deployment, Backdoor installation, Lateral movement techniques, PsExec and remote execution, WMI for lateral movement, PowerShell remoting, SSH pivoting, RDP hijacking, Pass-the-credential attacks, Internal network pivoting, Tunneling and port forwarding, Proxychains usage, Chisel and tunneling tools, Data exfiltration techniques, Covert channels, DNS exfiltration, HTTPS exfiltration, Artifact cleanup procedures, Log manipulation and clearing, Covering tracks, Tool removal and cleanup, Attack narrative creation, Timeline documentation, Screenshot and evidence capture, Remediation recommendation writing, Post-engagement debriefing, Lessons learned documentation
PenTest+ - Post-Exploitation and Lateral Movement Example Questions
Test your knowledge of Post-Exploitation and Lateral Movement
Question 1
What is the primary purpose of the Linux cron daemon when utilized as a persistence mechanism during a penetration test?
Question 2
Which PowerShell cmdlet is used to establish an interactive one-to-one remote session with a target system through WinRM?
Question 3
Which tool's native functionality would be MOST suitable for exfiltrating data through ICMP echo request packets when you need to extract 75MB of configuration files from a hardened Linux server that has all TCP/UDP ports blocked except for essential services, but ICMP is permitted for network diagnostics?