Post-Exploitation and Lateral Movement
Maintain persistence, perform lateral movement, and document findings to support remediation efforts (14% of exam).
In the context of CompTIA PenTest+, Post-Exploitation and Lateral Movement are critical phases that occur immediately after initial system compromise. While Post-Exploitation focuses on the local machine, Lateral Movement focuses on the network. Post-Exploitation aims to stabilize the foothold and…
PenTest+ - Post-Exploitation and Lateral Movement Example Questions
Test your knowledge of Post-Exploitation and Lateral Movement
Question 1
What is the primary purpose of the Linux cron daemon when utilized as a persistence mechanism during a penetration test?
Question 2
Which PowerShell cmdlet is used to establish an interactive one-to-one remote session with a target system through WinRM?
Question 3
Which tool's native functionality would be MOST suitable for exfiltrating data through ICMP echo request packets when you need to extract 75MB of configuration files from a hardened Linux server that has all TCP/UDP ports blocked except for essential services, but ICMP is permitted for network diagnostics?