A penetration tester wants to maintain access to a compromised system after a reboot. Which of the following techniques would be best for the tester to use?
Option D (Credential dumping) ❌: While useful for privilege escalation, it does not provide persistence.
???? Reference: CompTIA PenTest+ PT0-003 Official Guide – Persistence Techniques
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit