Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?

During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.

Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?
A . Spawn a shell using sudo and an escape string such as sudo vim -c ‘!sh’.
B . Perform ASIC password cracking on the host.
C . Read the /etc/passwd file to extract the usernames.
D . Initiate unquoted service path exploits.
E . Use the UNION operator to extract the database schema.

Answer: C

Explanation:

Reference: https://docs.rapid7.com/insightvm/elevating-permissions/

Latest CAS-004 Dumps Valid Version with 128 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments