A third-party penetration testing company was able to successfully use an ARP cache poison technique to gain root access on a server. The tester successfully moved to another server that was not in the original network.Which of the following is the MOST likely method used to gain access to the other host?
A. Backdoor
B. Pivoting
C. Persistance
D. Logic bomp
Answer; B. Pivoting
You might also like to view...
The ________ command moves charted data from the vertical axis to the horizontal axis and vice versa
Fill in the blank(s) with correct word
By default, all Ruby on Rails applications are configured to work with the SQLite database management system.
Answer the following statement true (T) or false (F)
What is the purpose of a baseline?
A. To provide the steps necessary to achieve security B. To assess the security state C. To provide all the detailed actions that personnel are required to follow D. To provide recommended actions to carry out under certain conditions
What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively??
A. 1.1.1.1? B. ?0.0.0.0 C. ?255.255.255.255 D. ?255.255.255.0