0
0
Cybersecurityknowledge~5 mins

Post-exploitation and pivoting in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is post-exploitation in cybersecurity?
Post-exploitation refers to the actions an attacker takes after gaining access to a system. It involves exploring the system, gathering information, maintaining access, and preparing for further attacks.
Click to reveal answer
beginner
Define pivoting in the context of a cyber attack.
Pivoting is when an attacker uses a compromised system as a stepping stone to access other systems within the same network that were not directly accessible before.
Click to reveal answer
intermediate
Why is maintaining access important during post-exploitation?
Maintaining access allows attackers to return to the compromised system later without repeating the initial breach, enabling long-term control and data extraction.
Click to reveal answer
intermediate
Name two common techniques used for pivoting.
Two common pivoting techniques are: 1) VPN pivoting, where attackers route traffic through the compromised machine, and 2) SSH tunneling, which creates encrypted tunnels to access other systems.
Click to reveal answer
intermediate
How does post-exploitation help in lateral movement within a network?
Post-exploitation provides attackers with information and tools to move laterally, meaning they can explore and compromise other machines on the network by exploiting trust relationships and credentials.
Click to reveal answer
What is the main goal of post-exploitation?
ATo explore and control the compromised system
BTo scan for vulnerabilities
CTo install antivirus software
DTo disconnect the network
Pivoting allows attackers to:
AEncrypt data on the compromised system
BAccess other systems through a compromised host
CPrevent network traffic
DInstall firewalls
Which of the following is NOT a post-exploitation activity?
AInitial vulnerability scanning
BMaintaining access
CGathering system information
DCredential harvesting
SSH tunneling is used in pivoting to:
ADelete system logs
BScan for open ports
CInstall malware
DCreate encrypted connections to other systems
Maintaining access during post-exploitation helps attackers to:
ADisconnect the network
BImmediately delete all files
CReturn to the system without re-exploiting
DNotify system administrators
Explain what post-exploitation is and why it is important in a cyber attack.
Think about what an attacker does after breaking into a system.
You got /3 concepts.
    Describe pivoting and how attackers use it to move within a network.
    Consider how attackers reach systems they can't access directly.
    You got /3 concepts.