During a penetration test, a tester successfully gained initial access through a vulnerable web application. The next step is to establish persistence on the compromised server without relying on the initial exploit. Which post-exploitation technique would be a high-level strategic choice for achieving this?
Correct Answer: Modify system startup scripts Explanation: Modifying system startup scripts (e.g., cron jobs on Linux, services on Windows) is a common and effective technique for establishing persistence, ensuring the attacker maintains access even if the system is rebooted. Creating a new privileged account is also persistence but "modify system startup scripts" is more general and high-level, covering various methods.
Correct Answer: Modify system startup scripts Explanation: Modifying system startup scripts (e.g., cron jobs on Linux, services on Windows) is a common and effective technique for establishing persistence, ensuring the attacker maintains access even if the system is rebooted. Creating a new privileged account is also persistence but "modify system startup scripts" is more general and high-level, covering various methods.