Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?
During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.
Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?
A . Spawn a shell using sudo and an escape string such as sudo vim -c ‘!sh’.
B . Perform ASIC password cracking on the host.
C . Read the /etc/passwd file to extract the usernames.
D . Initiate unquoted service path exploits.
E . Use the UNION operator to extract the database schema.
Answer: C
Explanation:
Reference: https://docs.rapid7.com/insightvm/elevating-permissions/
Latest CAS-004 Dumps Valid Version with 128 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments