0
0
Cybersecurityknowledge~10 mins

Post-exploitation and pivoting in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to identify the stage after gaining initial access in a penetration test.

Cybersecurity
The phase after initial access is called [1].
Drag options to blanks, or click blank then click option'
APost-exploitation
BReconnaissance
CScanning
DEnumeration
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing post-exploitation with reconnaissance or scanning phases.
2fill in blank
medium

Complete the sentence to describe pivoting in cybersecurity.

Cybersecurity
Pivoting allows an attacker to [1] from a compromised system to other systems within the network.
Drag options to blanks, or click blank then click option'
Ascan externally
Bmove laterally
Cencrypt data
Ddisconnect
Attempts:
3 left
💡 Hint
Common Mistakes
Thinking pivoting means scanning or encrypting data.
3fill in blank
hard

Fix the error in the description of a pivoting method.

Cybersecurity
One common pivoting method is [1], which creates a tunnel through the compromised host to access other network segments.
Drag options to blanks, or click blank then click option'
Aphishing
Bpassword cracking
Cport forwarding
Dfirewall blocking
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing pivoting methods with attack techniques like phishing.
4fill in blank
hard

Fill both blanks to complete the dictionary comprehension that maps compromised hosts to their pivoting {{BLANK_1}} and {{BLANK_2}}.

Cybersecurity
pivot_map = {host: ([1], [2]) for host in compromised_hosts}
Drag options to blanks, or click blank then click option'
Aip_address
Bport
Cusername
Dpassword
Attempts:
3 left
💡 Hint
Common Mistakes
Using credentials instead of network details for pivoting.
5fill in blank
hard

Fill all three blanks to complete the code that filters hosts for pivoting based on access level and network segment.

Cybersecurity
eligible_hosts = {host: info for host, info in network_hosts.items() if info['access'] == [1] and info['segment'] == [2] and info['status'] == [3]
Drag options to blanks, or click blank then click option'
A'admin'
B'internal'
C'active'
D'guest'
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing guest access or external segments for pivoting.