Anomaly 38 - Trivia 10
In a penetration test, which of the following techniques would be most effective for escalating privileges after gaining initial access to a target system?
a) Conducting a brute-force attack against system services. - Not the easiet way to get priv esc
b) Exploiting misconfigured network shares to gain access to sensitive files. - We are not after files
c) Leveraging a zero-day vulnerability to execute arbitrary code. - Rarley would you even know of a zero day or even use one espically as a pen tester
d) Exploiting a known vulnerability to escalate privileges via a privilege escalation exploit.
Last modified: 28 May 2024