adplus-dvertising
frame-decoration

Question

Angela wants to exfiltrate data from a Windows system she has gained access to during a penetration test. Which of the following exfiltration techniques is least likely to be detected?

a.

Send it via outbound HTTP as plaintext to a system she controls.

b.

Hash the data, then send the hash via outbound HTTPS.

c.

Use PowerShell to base64-encode the data, then post to a public HTTPS-accessible code repository.

d.

Use PowerShell to base64-encode the data, then use an SSH tunnel to transfer the data to a system she controls.

Answer: (c).Use PowerShell to base64-encode the data, then post to a public HTTPS-accessible code repository. Explanation:Encoding data will make it less likely that intrusion prevention and data loss prevention systems will identify acquired data, meaning that encoding is a useful technique. Sending the data to a public repository like GitHub is less likely to look unusual than an internal system opening an SSH tunnel to a previously unknown system. Sending via HTTP instead of HTTPS will make inspection of the outbound, unencoded data trivial for defenders, and hashing the data will not leave it in a recoverable state when it arrives.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Angela wants to exfiltrate data from a Windows system she has gained access to during a penetration test. Which of the following exfiltration techniques is least likely to be...

Similar Questions

Discover Related MCQs

Q. Ian’s penetration test rules of engagement specify that he cannot add tools to the systems he compromises in a specific target environment. What techniques will he have to use to meet this requirement?

Q. Tina has acquired a list of valid user accounts but does not have passwords for them. If she has not found any vulnerabilities but believes that the organization she is targeting has poor password practices, what type of attack can she use to try to gain access to a target system where those usernames are likely valid?

Q. What built-in Windows server administration tool can allow command-line PowerShell access from other systems?

Q. John wants to retain access to a Linux system. Which of the following is not a common method of maintaining persistence on Linux servers?

Q. Tim has selected his Metasploit exploit and set his payload as cmd/unix/generic.
After attempting the exploit, he receives the following output. What went wrong?

Q. Cameron runs the following command via an administrative shell on a Windows system he has compromised. What has he accomplished?

$command = 'cmd /c powershell.exe -c Set-WSManQuickConfig -Force;Set-Item WSMan:\localhost\Service\Auth\Basic -Value $True;SetItem WSMan:\localhost\Service\AllowUnencrypted -Value $True;Register-PSSessionConfiguration -Name Microsoft.PowerShell -Force'

Q. Mike discovers a number of information exposure vulnerabilities while preparing for the exploit phase of a penetration test. If he has not been able to identify user or service information beyond vulnerability details, what priority should he place on exploiting them?

Q. Annie is using a collection of leaked passwords to attempt to log in to multiple user accounts belonging to staff of the company she is penetration testing. The tool she is using attempts to log into each account using a single password, then moves on to the next password, recording failures and successes. What type of attack is Annie conducting?

Q. Jacob wants to capture user hashes on a Windows network. Which tool could he select to gather these from broadcast messages?

Q. Madhuri has been asked to run BloodHound as part of her penetration testing efforts. What will she be able to do with the tool?

Q. Ben is performing a penetration test as part of a PCI DSS engagement. What technique is he most likely to use as part of network segmentation testing?