Complete the code to identify the stage after gaining initial access in a penetration test.
The phase after initial access is called [1].Post-exploitation is the phase after gaining initial access where the attacker explores the compromised system.
Complete the sentence to describe pivoting in cybersecurity.
Pivoting allows an attacker to [1] from a compromised system to other systems within the network.
Pivoting is the technique of moving laterally within a network from one compromised system to others.
Fix the error in the description of a pivoting method.
One common pivoting method is [1], which creates a tunnel through the compromised host to access other network segments.Port forwarding is a pivoting technique that tunnels traffic through a compromised host to reach other systems.
Fill both blanks to complete the dictionary comprehension that maps compromised hosts to their pivoting {{BLANK_1}} and {{BLANK_2}}.
pivot_map = {host: ([1], [2]) for host in compromised_hosts}The pivot_map dictionary links each host to its IP address and port used for pivoting.
Fill all three blanks to complete the code that filters hosts for pivoting based on access level and network segment.
eligible_hosts = {host: info for host, info in network_hosts.items() if info['access'] == [1] and info['segment'] == [2] and info['status'] == [3]This code selects hosts where access is 'admin', segment is 'internal', and status is 'active' for pivoting.