Python for Network Forensics 5.4: Post Enumeration

Python for Network Forensics 5.4: Post Enumeration

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

This lesson focuses on post-enumeration techniques, specifically privilege escalation using a reverse shell. It introduces the Linux Proof Checker script, which identifies privilege escalation vulnerabilities. The script's functionality, including system and network information gathering, is explained. The lesson concludes with practical applications and a preview of data exfiltration techniques.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of privilege escalation in the context of a threat lifecycle?

To reduce system privileges

To gain higher or different privileges

To delete system logs

To encrypt user data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Lennox Proof Checker primarily used for?

To update system software

To scan for viruses

To check system performance

To identify privilege escalation vulnerabilities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which programming language is the Lennox Proof Checker written in?

C++

Java

Ruby

Python 2

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of transferring the Lennox Proof Checker to a remote host?

To gather system information for privilege escalation

To update the host's operating system

To install new software

To delete unnecessary files

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is used to execute the Lennox Proof Checker script?

gcc LennoxProofChecker

python LennoxProofChecker

bash LennoxProofChecker

java LennoxProofChecker

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common exploit mentioned for older systems in the video?

Spectre

Heartbleed

Meltdown

2.6 udev

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to use a directory scanner on the system?

To find mismanaged or under-permissioned files

To increase system speed

To install new applications

To delete temporary files

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?