Which of the following file system vulnerabilities does this command take advantage of?

During post-exploitation, a tester identifies that only system binaries will pass an egress filter and store a file with the following command:

c: creditcards.db>c:winitsystem32calc.exe:creditcards.db

Which of the following file system vulnerabilities does this command take advantage of?
A . Hierarchical file system
B . Alternate data streams
C . Backdoor success
D . Extended file system

Answer: B

Latest PT0-001 Dumps Valid Version with 248 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments