Python for Network Forensics 5.4: Post Enumeration

Python for Network Forensics 5.4: Post Enumeration

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

This lesson focuses on post-enumeration techniques, specifically privilege escalation using a reverse shell. It introduces the Linux Proof Checker script, which identifies privilege escalation vulnerabilities. The script's functionality, including system and network information gathering, is explained. The lesson concludes with practical applications and a preview of data exfiltration techniques.

Read more

3 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What are some examples of services that might be running as root or superuser?

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

Explain the significance of checking for kernel exploits in the context of privilege escalation.

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What steps should be taken to identify potential privilege escalation vectors on a system?

Evaluate responses using AI:

OFF