Python for Network Forensics 5.4: Post Enumeration

Python for Network Forensics 5.4: Post Enumeration

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

This lesson focuses on post-enumeration techniques, specifically privilege escalation using a reverse shell. It introduces the Linux Proof Checker script, which identifies privilege escalation vulnerabilities. The script's functionality, including system and network information gathering, is explained. The lesson concludes with practical applications and a preview of data exfiltration techniques.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of privilege escalation in the context of a threat lifecycle?

To reduce system privileges

To gain higher or different privileges

To delete system logs

To encrypt user data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Lennox Proof Checker primarily used for?

To update system software

To scan for viruses

To check system performance

To identify privilege escalation vulnerabilities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which programming language is the Lennox Proof Checker written in?

C++

Java

Ruby

Python 2

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of transferring the Lennox Proof Checker to a remote host?

To gather system information for privilege escalation

To update the host's operating system

To install new software

To delete unnecessary files

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is used to execute the Lennox Proof Checker script?

gcc LennoxProofChecker

python LennoxProofChecker

bash LennoxProofChecker

java LennoxProofChecker

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common exploit mentioned for older systems in the video?

Spectre

Heartbleed

Meltdown

2.6 udev

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to use a directory scanner on the system?

To find mismanaged or under-permissioned files

To increase system speed

To install new applications

To delete temporary files