1. What is the primary goal of post-exploitation in a penetration test?

  • A) Finding and fixing vulnerabilities
  • B) Exploiting multiple systems
  • C) Maintaining persistent access and gathering intelligence
  • D) Running DoS attacks

Answer: C) Maintaining persistent access and gathering intelligence
Explanation: Post-exploitation is focused on maintaining access, escalating privileges, gathering sensitive data, and determining the value of the compromised system for further actions.


2. Which method is commonly used to maintain persistence on a Windows system?

  • A) SSH Tunneling
  • B) Backdoored SSH Keys
  • C) Creating a registry run key
  • D) ICMP Tunneling

Answer: C) Creating a registry run key
Explanation: Attackers can add malicious entries in Windows Registry under HKCU\Software\Microsoft\Windows\CurrentVersion\Run to automatically execute payloads on startup.


3. What is a common persistence mechanism used in Linux environments?

  • A) Sticky Keys Attack
  • B) Cron Job Execution
  • C) DLL Sideloading
  • D) ARP Poisoning

Answer: B) Cron Job Execution
Explanation: Attackers often add a malicious cron job in /etc/crontab or a user’s crontab (crontab -e) to execute scripts at regular intervals.


4. What is the primary function of Meterpreter’s persistence module?

  • A) Encrypting network traffic
  • B) Establishing a reverse shell at system startup
  • C) Exploiting buffer overflows
  • D) Conducting SQL Injection attacks

Answer: B) Establishing a reverse shell at system startup
Explanation: The persistence module in Metasploit’s Meterpreter sets up an automated connection back to the attacker each time the system reboots.


5. What is the advantage of using a rootkit in post-exploitation?

  • A) It allows privilege escalation
  • B) It helps evade detection by hiding processes
  • C) It can brute-force user passwords
  • D) It scans for open ports

Answer: B) It helps evade detection by hiding processes
Explanation: Rootkits can hide malicious processes, files, and network connections, making them difficult to detect using traditional security tools.


6. What is the primary risk of leaving backdoors in a compromised system?

  • A) It can be detected by antivirus software
  • B) Other attackers may find and exploit it
  • C) The system will slow down significantly
  • D) The logs will get deleted

Answer: B) Other attackers may find and exploit it
Explanation: Unsecured backdoors can be discovered by other malicious actors, leading to unintended system compromises.


7. How does a DNS Tunneling attack help in maintaining access?

  • A) It injects malicious JavaScript into DNS packets
  • B) It allows data exfiltration through DNS queries
  • C) It changes the DNS records on the target machine
  • D) It disrupts the domain name resolution process

Answer: B) It allows data exfiltration through DNS queries
Explanation: Attackers use DNS tunneling to bypass security controls and exfiltrate data through encoded DNS requests and responses.


8. Which post-exploitation technique involves manipulating legitimate system processes to execute malicious code?

  • A) DLL Injection
  • B) SQL Injection
  • C) Cross-Site Scripting
  • D) Credential Stuffing

Answer: A) DLL Injection
Explanation: DLL Injection involves forcing a legitimate process to load and execute a malicious DLL, often used for stealthy persistence.


9. What tool is commonly used for credential dumping on Windows?

  • A) Hydra
  • B) Mimikatz
  • C) Sqlmap
  • D) Nmap

Answer: B) Mimikatz
Explanation: Mimikatz extracts credentials from memory, including plaintext passwords, NTLM hashes, and Kerberos tickets.


10. What is the main purpose of privilege escalation in post-exploitation?

  • A) Crashing the system
  • B) Gaining higher-level access for executing more powerful commands
  • C) Flooding the network with requests
  • D) Running a virus scanner

Answer: B) Gaining higher-level access for executing more powerful commands
Explanation: Privilege escalation allows attackers to gain admin/system/root access, enabling deeper system control.


11. Which file can an attacker modify to maintain SSH persistence on a Linux system?

  • A) /etc/hosts
  • B) ~/.ssh/authorized_keys
  • C) /etc/passwd
  • D) /etc/sudoers

Answer: B) ~/.ssh/authorized_keys
Explanation: Attackers add their SSH public key to ~/.ssh/authorized_keys for persistent access.


12. What is the main reason attackers use PowerShell scripts in post-exploitation?

  • A) It is slow and inefficient
  • B) It is commonly blocked by Windows Defender
  • C) It allows fileless attacks and avoids AV detection
  • D) It only runs on Linux

Answer: C) It allows fileless attacks and avoids AV detection
Explanation: PowerShell scripts can execute payloads directly in memory, bypassing antivirus detection.


13. What is Lateral Movement in post-exploitation?

  • A) Moving laterally between physical networks
  • B) Accessing and compromising additional systems within the network
  • C) Sending phishing emails
  • D) Brute-forcing passwords

Answer: B) Accessing and compromising additional systems within the network
Explanation: Attackers use Lateral Movement to spread through the network, often using stolen credentials.


14. What is the primary function of Kerberoasting?

  • A) Exploiting a vulnerable SSH service
  • B) Cracking Kerberos service tickets to extract plaintext passwords
  • C) Deploying ransomware on a domain controller
  • D) Hijacking user sessions

Answer: B) Cracking Kerberos service tickets to extract plaintext passwords
Explanation: Kerberoasting abuses weak service account passwords to extract and crack Kerberos TGS tickets.


15. What is the purpose of using a Web Shell in maintaining access?

  • A) To disable firewall protections
  • B) To allow remote command execution via a web interface
  • C) To brute-force user credentials
  • D) To inject SQL queries into a database

Answer: B) To allow remote command execution via a web interface
Explanation: Web Shells (e.g., China Chopper) allow attackers to execute commands on a compromised web server.


16. Which of the following tools is commonly used for post-exploitation activities such as pivoting and lateral movement?

  • A) Nessus
  • B) Cobalt Strike
  • C) Wireshark
  • D) Nikto

Answer: B) Cobalt Strike
Explanation: Cobalt Strike provides post-exploitation tools such as pivoting, privilege escalation, and beacon communication, making it popular among both pentesters and adversaries.


17. What is the purpose of “Golden Ticket” attacks in post-exploitation?

  • A) Creating a fake Active Directory domain
  • B) Gaining long-term domain admin access using forged Kerberos tickets
  • C) Encrypting network traffic
  • D) Sending phishing emails

Answer: B) Gaining long-term domain admin access using forged Kerberos tickets
Explanation: Golden Ticket attacks use forged Kerberos TGTs to grant persistent access to a Windows domain, often bypassing authentication mechanisms.


18. What is the advantage of using a reverse shell in post-exploitation?

  • A) The attacker’s IP remains hidden
  • B) The target system initiates the connection, bypassing firewalls
  • C) It cannot be detected by antivirus
  • D) It is the fastest method of privilege escalation

Answer: B) The target system initiates the connection, bypassing firewalls
Explanation: Reverse shells work by having the compromised system connect back to the attacker, evading inbound firewall restrictions.


19. What type of malware is designed to provide long-term access and evade detection on a system?

  • A) Worm
  • B) Rootkit
  • C) Ransomware
  • D) Keylogger

Answer: B) Rootkit
Explanation: Rootkits operate at the kernel level, hiding their presence and providing persistent access.


20. Which Windows feature can be abused for persistent access via scheduled task execution?

  • A) Task Manager
  • B) Windows Defender
  • C) Task Scheduler
  • D) Registry Editor

Answer: C) Task Scheduler
Explanation: Attackers can use schtasks.exe to schedule a malicious script or payload to execute at regular intervals.


21. What attack technique involves reusing an existing authenticated session token to gain unauthorized access?

  • A) Token Hijacking
  • B) ARP Spoofing
  • C) SQL Injection
  • D) DNS Spoofing

Answer: A) Token Hijacking
Explanation: Token Hijacking allows an attacker to reuse a stolen session token for unauthorized access.


22. What does the Sticky Keys attack exploit?

  • A) Command execution by replacing accessibility executables
  • B) SQL Injection in authentication fields
  • C) Buffer overflow in Windows
  • D) Network traffic manipulation

Answer: A) Command execution by replacing accessibility executables
Explanation: Attackers replace Sticky Keys (sethc.exe) with a malicious shell, allowing command execution at the login screen.


23. What is the function of an attacker-controlled Command & Control (C2) server in post-exploitation?

  • A) Encrypting compromised data
  • B) Sending commands and receiving data from infected machines
  • C) Disabling security software
  • D) Running phishing campaigns

Answer: B) Sending commands and receiving data from infected machines
Explanation: C2 servers allow attackers to remotely control compromised hosts, exfiltrate data, and execute commands.


24. How does a “Pass-the-Hash” attack work?

  • A) Cracking hashed passwords to plaintext
  • B) Using stolen password hashes to authenticate without cracking them
  • C) Exploiting weak hashing algorithms
  • D) Injecting malicious hashes into a database

Answer: B) Using stolen password hashes to authenticate without cracking them
Explanation: Pass-the-Hash allows an attacker to reuse NTLM or LM hashes for authentication without knowing the plaintext password.


25. Which of the following can be used to execute malicious code without dropping files on disk?

  • A) Process Hollowing
  • B) Brute Force Attack
  • C) Directory Traversal
  • D) SQL Injection

Answer: A) Process Hollowing
Explanation: Process Hollowing injects malicious code into a legitimate process, executing it in-memory to evade AV detection.


26. What is a “Silver Ticket” attack used for?

  • A) Exploiting SQL servers
  • B) Gaining access to specific Kerberos service tickets
  • C) Conducting phishing campaigns
  • D) Bypassing multi-factor authentication

Answer: B) Gaining access to specific Kerberos service tickets
Explanation: Silver Tickets allow attackers to forge service tickets (TGS) and gain unauthorized access.


27. What is a key feature of an obfuscated payload in post-exploitation?

  • A) It is impossible to detect
  • B) It is encrypted to avoid detection
  • C) It causes immediate system crashes
  • D) It requires user interaction to execute

Answer: B) It is encrypted to avoid detection
Explanation: Obfuscation techniques encode or encrypt payloads to bypass security solutions.


28. What is an effective method to establish long-term persistence on a compromised web server?

  • A) Editing /etc/hosts
  • B) Deploying a web shell
  • C) Modifying the ARP table
  • D) Using Wireshark

Answer: B) Deploying a web shell
Explanation: Attackers often use web shells (e.g., c99.php) to maintain remote access.


29. What post-exploitation tool is specifically designed to bypass UAC (User Account Control) in Windows?

  • A) WinPeas
  • B) UACMe
  • C) Hydra
  • D) sqlmap

Answer: B) UACMe
Explanation: UACMe exploits Windows User Account Control (UAC) to escalate privileges.


30. Which file stores local user password hashes on a Windows system?

  • A) /etc/passwd
  • B) SAM
  • C) NetNTLM.dat
  • D) NTDS.dit

Answer: B) SAM
Explanation: Windows Security Account Manager (SAM) stores hashed passwords in the registry.


31. What persistence method involves replacing legitimate Windows services with a malicious binary?

  • A) DLL Injection
  • B) Service Hijacking
  • C) Command Injection
  • D) Keylogging

Answer: B) Service Hijacking
Explanation: Attackers modify service executables or configurations to launch backdoors at startup.


32. What does the term “living off the land” (LOTL) refer to in post-exploitation?

  • A) Using built-in system tools for attacks
  • B) Running payloads in remote locations
  • C) Using Tor for anonymity
  • D) Running malware on a compromised system

Answer: A) Using built-in system tools for attacks
Explanation: LOTL attacks leverage native tools (e.g., PowerShell, WMI, PsExec) to avoid detection.


33. What is the primary purpose of a bind shell in post-exploitation?

  • A) To initiate a connection back to the attacker
  • B) To listen for incoming connections from an attacker
  • C) To execute malware on the target system
  • D) To modify firewall rules

Answer: B) To listen for incoming connections from an attacker
Explanation: A bind shell opens a port on the compromised machine and waits for an attacker to connect.


34. Which Windows feature allows attackers to execute scripts in-memory, avoiding disk-based detection?

  • A) Group Policy
  • B) Windows Script Host (WSH)
  • C) Active Directory
  • D) Registry Editor

Answer: B) Windows Script Host (WSH)
Explanation: WSH enables the execution of scripts (.vbs, .js, .wsf) without writing files to disk.


35. What is the purpose of a keylogger in post-exploitation?

  • A) Logging all system errors
  • B) Capturing and recording keystrokes
  • C) Modifying system logs
  • D) Preventing brute-force attacks

Answer: B) Capturing and recording keystrokes
Explanation: Keyloggers record user input, allowing attackers to steal passwords and other sensitive data.


36. Which attack technique exploits scheduled tasks to maintain persistence on a Windows system?

  • A) Registry Injection
  • B) Task Hijacking
  • C) DDE Exploitation
  • D) Pass-the-Ticket

Answer: B) Task Hijacking
Explanation: Attackers modify scheduled tasks to run malicious commands at predefined times.


37. What is the purpose of disabling security software in post-exploitation?

  • A) To avoid detection and maintain access
  • B) To improve system performance
  • C) To install legitimate software
  • D) To prevent system crashes

Answer: A) To avoid detection and maintain access
Explanation: Attackers often disable antivirus, firewalls, and logging mechanisms to remain undetected.


38. Which command in Windows is used to enumerate active user sessions?

  • A) net use
  • B) query user
  • C) arp -a
  • D) tracert

Answer: B) query user
Explanation: The query user command lists logged-in users and active sessions on a Windows system.


39. What does netsh advfirewall set allprofiles state off do on a Windows system?

  • A) Enables the firewall for all profiles
  • B) Disables the firewall for all profiles
  • C) Creates a new firewall rule
  • D) Logs all firewall activity

Answer: B) Disables the firewall for all profiles
Explanation: This command disables the Windows firewall, allowing unrestricted network access.


40. What persistence technique abuses Windows Management Instrumentation (WMI)?

  • A) WMI Event Subscription
  • B) WMI Packet Injection
  • C) WMI Buffer Overflow
  • D) WMI Reverse Shell

Answer: A) WMI Event Subscription
Explanation: WMI event subscriptions execute payloads when specific system events occur.


41. What is the purpose of using net use \\target\C$ /user:Administrator in post-exploitation?

  • A) Creating a new user
  • B) Mapping a hidden administrative share
  • C) Modifying system logs
  • D) Encrypting system files

Answer: B) Mapping a hidden administrative share
Explanation: The C$ administrative share provides remote access to C:\ drive on Windows systems.


42. What does the persistence module in Metasploit do?

  • A) Hides the attacker’s presence
  • B) Ensures a backdoor runs after reboot
  • C) Deletes system logs
  • D) Blocks antivirus detection

Answer: B) Ensures a backdoor runs after reboot
Explanation: The persistence module creates registry keys or scheduled tasks to maintain access.


43. What is the primary purpose of using wevtutil in post-exploitation?

  • A) Modifying Windows registry
  • B) Dumping or clearing event logs
  • C) Creating new user accounts
  • D) Executing remote code

Answer: B) Dumping or clearing event logs
Explanation: wevtutil can export, delete, or modify Windows event logs to cover attack traces.


44. How does an attacker use DLL Sideloading to maintain access?

  • A) By modifying system registry entries
  • B) By replacing legitimate DLLs with malicious ones
  • C) By modifying network configurations
  • D) By creating new user accounts

Answer: B) By replacing legitimate DLLs with malicious ones
Explanation: DLL Sideloading loads a malicious DLL instead of a legitimate one, gaining execution privileges.


45. What method allows attackers to execute code with SYSTEM privileges?

  • A) Kerberoasting
  • B) Token Impersonation
  • C) ARP Spoofing
  • D) Cross-Site Scripting

Answer: B) Token Impersonation
Explanation: Token Impersonation allows attackers to steal high-privilege tokens, executing commands as SYSTEM.


46. What command in Linux is commonly used to escalate privileges?

  • A) whoami
  • B) sudo -i
  • C) ifconfig
  • D) ls -la

Answer: B) sudo -i
Explanation: sudo -i elevates the user to root privileges, allowing unrestricted system access.


47. Which technique involves modifying system binaries to execute malware?

  • A) Binary Padding
  • B) Binary Hijacking
  • C) Kernel Injection
  • D) Phishing

Answer: B) Binary Hijacking
Explanation: Binary Hijacking replaces system binaries with malicious versions.


48. What is the function of the schtasks command in Windows?

  • A) Disables the firewall
  • B) Creates scheduled tasks
  • C) Dumps memory contents
  • D) Modifies Active Directory policies

Answer: B) Creates scheduled tasks
Explanation: schtasks is used to create and manage scheduled tasks for persistence.


49. How does a “Doppelganging” attack evade security detection?

  • A) By modifying system logs
  • B) By injecting malicious code into processes without writing to disk
  • C) By hiding in encrypted files
  • D) By disabling antivirus

Answer: B) By injecting malicious code into processes without writing to disk
Explanation: Process Doppelgänging allows malware to bypass AV detection by running fileless.


50. What tool is commonly used to exploit misconfigured SMB shares?

  • A) Responder
  • B) John the Ripper
  • C) Empire
  • D) CrackMapExec

Answer: D) CrackMapExec
Explanation: CrackMapExec is used for SMB enumeration and exploitation.


51. What is the primary advantage of using PowerShell Empire in post-exploitation?

  • A) It automates SQL Injection attacks
  • B) It provides a framework for fileless attacks
  • C) It is used for network scanning
  • D) It encrypts stolen data

Answer: B) It provides a framework for fileless attacks
Explanation: PowerShell Empire enables fileless persistence, executing payloads directly in memory to bypass AV detection.


52. What is the purpose of a Golden SAML attack?

  • A) Bypassing Active Directory authentication using forged SAML assertions
  • B) Extracting SAML tokens from encrypted databases
  • C) Exploiting vulnerabilities in LDAP authentication
  • D) Cracking NTLM hashes

Answer: A) Bypassing Active Directory authentication using forged SAML assertions
Explanation: Golden SAML attacks involve forging SAML authentication tokens to impersonate users and gain unauthorized access.


53. Which protocol is commonly exploited for Lateral Movement in a Windows domain environment?

  • A) FTP
  • B) RDP
  • C) SMTP
  • D) SNMP

Answer: B) RDP
Explanation: Attackers use Remote Desktop Protocol (RDP) for moving between systems within a Windows domain.


54. What is the function of rundll32.exe in post-exploitation?

  • A) Encrypting files
  • B) Loading and executing DLL files
  • C) Deleting system logs
  • D) Establishing persistence via SSH

Answer: B) Loading and executing DLL files
Explanation: Attackers use rundll32.exe to execute malicious DLLs while evading security software.


55. What does the secedit command do in Windows post-exploitation?

  • A) Modifies security policies
  • B) Extracts password hashes
  • C) Terminates active user sessions
  • D) Alters Active Directory objects

Answer: A) Modifies security policies
Explanation: Attackers can use secedit to modify system security settings, often disabling defenses.


56. What is an effective way to maintain persistence on macOS?

  • A) Modifying Windows registry
  • B) Using Launch Agents and Launch Daemons
  • C) Running Mimikatz
  • D) Injecting PowerShell scripts

Answer: B) Using Launch Agents and Launch Daemons
Explanation: Launch Agents (~/Library/LaunchAgents) and Launch Daemons (/Library/LaunchDaemons) enable macOS persistence.


57. What is a “Ghost User” in post-exploitation?

  • A) A deleted user account that still has access
  • B) A hidden administrator account
  • C) A user that is invisible in logs but active
  • D) A decoy user account for distraction

Answer: B) A hidden administrator account
Explanation: Attackers create “ghost users” by modifying user attributes to maintain access without detection.


58. What is the purpose of wmic in post-exploitation?

  • A) Gathering system information and executing remote commands
  • B) Modifying NTFS permissions
  • C) Encrypting files before exfiltration
  • D) Running SQL queries on the target machine

Answer: A) Gathering system information and executing remote commands
Explanation: WMIC (Windows Management Instrumentation Command-line) allows system enumeration, execution, and process manipulation.


59. What does the reg add command do in Windows?

  • A) Creates new user accounts
  • B) Adds new registry entries for persistence
  • C) Modifies Active Directory users
  • D) Kills running processes

Answer: B) Adds new registry entries for persistence
Explanation: Attackers use reg add to modify Windows Registry for maintaining access or executing payloads.


60. Which protocol is commonly used for tunneling attacks to bypass security restrictions?

  • A) UDP
  • B) SSH
  • C) ICMP
  • D) SMTP

Answer: C) ICMP
Explanation: ICMP tunneling allows attackers to send malicious data within ICMP packets, evading detection.


61. What attack involves manipulating Windows Authentication Packages to steal credentials?

  • A) Skeleton Key Attack
  • B) Credential Stuffing
  • C) Kerberoasting
  • D) NTLM Relay Attack

Answer: A) Skeleton Key Attack
Explanation: Skeleton Key malware injects a malicious authentication package, allowing attackers to use a universal password.


62. What method is commonly used to maintain access on cloud environments like AWS?

  • A) Deploying a web shell
  • B) Creating hidden IAM users and access keys
  • C) Using Mimikatz
  • D) Encrypting network traffic

Answer: B) Creating hidden IAM users and access keys
Explanation: Attackers maintain AWS persistence by creating backdoor IAM users with high privileges.


63. What does a “Domain Fronting” attack accomplish?

  • A) Conceals malicious traffic within legitimate domains
  • B) Executes SQL Injection against domains
  • C) Creates hidden subdomains for phishing
  • D) Allows DNS cache poisoning

Answer: A) Conceals malicious traffic within legitimate domains
Explanation: Domain Fronting masks C2 traffic by routing through legitimate domains.


64. Which service is commonly exploited for gaining persistence via Windows Services?

  • A) svchost.exe
  • B) winlogon.exe
  • C) lsass.exe
  • D) explorer.exe

Answer: A) svchost.exe
Explanation: svchost.exe hosts system services, and attackers often use service hijacking for persistence.


65. What is an example of an attack using Alternate Data Streams (ADS) in NTFS?

  • A) Hiding malware within a legitimate file without changing its size
  • B) Injecting malicious SQL queries
  • C) Conducting brute-force attacks
  • D) Manipulating Active Directory

Answer: A) Hiding malware within a legitimate file without changing its size
Explanation: ADS in NTFS allows malware to hide inside legitimate files without modifying file properties.


66. What is the purpose of “Living off the Land Binaries and Scripts” (LOLBAS)?

  • A) Using built-in system tools to evade detection
  • B) Encrypting all stolen data
  • C) Running privilege escalation exploits
  • D) Creating botnets

Answer: A) Using built-in system tools to evade detection
Explanation: LOLBAS attacks use trusted system binaries (e.g., mshta, regsvr32) to execute malicious code without detection.


67. What is the purpose of an attacker modifying the hosts file (C:\Windows\System32\drivers\etc\hosts)?

  • A) Redirecting domain requests to malicious servers
  • B) Modifying system logs
  • C) Extracting password hashes
  • D) Disabling security updates

Answer: A) Redirecting domain requests to malicious servers
Explanation: Attackers modify the hosts file to redirect traffic to fake login pages.


68. Which of the following allows for long-term persistence by modifying user authentication tokens?

  • A) Pass-the-Hash
  • B) Pass-the-Ticket
  • C) Lateral Movement
  • D) Heap Spraying

Answer: B) Pass-the-Ticket
Explanation: Pass-the-Ticket (PTT) allows attackers to reuse Kerberos tickets for unauthorized authentication.


69. What is a key characteristic of a fileless malware attack?

  • A) It resides entirely in memory without writing to disk
  • B) It requires user interaction to execute
  • C) It can only infect Linux systems
  • D) It modifies system boot settings

Answer: A) It resides entirely in memory without writing to disk
Explanation: Fileless malware executes directly in memory, bypassing traditional antivirus solutions.


70. Which of the following Windows event logs is most useful for tracking unauthorized user logins?

  • A) System Log
  • B) Security Log
  • C) Application Log
  • D) Setup Log

Answer: B) Security Log
Explanation: The Security Log (Event ID 4624, 4625, 4768, 4769) tracks logins, authentication attempts, and failures.


71. What is the main purpose of PsExec in post-exploitation?

  • A) Running commands remotely on Windows systems
  • B) Extracting password hashes
  • C) Manipulating Active Directory objects
  • D) Conducting SQL Injection attacks

Answer: A) Running commands remotely on Windows systems
Explanation: PsExec allows attackers to execute commands on remote machines without requiring RDP.


72. What does net group "Domain Admins" /domain reveal in a compromised environment?

  • A) The current firewall settings
  • B) The list of domain administrator accounts
  • C) A list of all active users
  • D) The network interface configurations

Answer: B) The list of domain administrator accounts
Explanation: Attackers use this command to enumerate high-privilege domain users.


73. How can an attacker use certutil maliciously?

  • A) Downloading and decoding malware
  • B) Manipulating DNS records
  • C) Deleting system logs
  • D) Creating fake domain certificates

Answer: A) Downloading and decoding malware
Explanation: Certutil can be abused to fetch and decode malicious payloads, bypassing security controls.


74. What is the purpose of “PowerSploit” in post-exploitation?

  • A) A PowerShell framework for post-exploitation tasks
  • B) A brute-force password cracker
  • C) A tool for encrypting exfiltrated data
  • D) A Linux privilege escalation tool

Answer: A) A PowerShell framework for post-exploitation tasks
Explanation: PowerSploit contains modules for privilege escalation, credential dumping, and persistence.


75. What is the purpose of the “Sticky Keys Backdoor” technique?

  • A) Launching a system shell from the login screen
  • B) Bypassing anti-malware software
  • C) Modifying Windows group policies
  • D) Manipulating BIOS settings

Answer: A) Launching a system shell from the login screen
Explanation: Attackers replace sethc.exe with cmd.exe, allowing unauthenticated access to a system shell.


76. What is the role of svchost.exe in process injection attacks?

  • A) It allows attackers to inject malicious payloads into a system process
  • B) It is used for network reconnaissance
  • C) It prevents privilege escalation
  • D) It logs all system changes

Answer: A) It allows attackers to inject malicious payloads into a system process
Explanation: Attackers inject malicious code into svchost.exe to evade security tools.


77. How does a “Token Stealing” attack work in Windows?

  • A) By copying authentication tokens from memory to impersonate users
  • B) By brute-forcing login credentials
  • C) By modifying registry keys
  • D) By injecting JavaScript into login forms

Answer: A) By copying authentication tokens from memory to impersonate users
Explanation: Token Stealing allows an attacker to reuse existing authentication tokens for lateral movement.


78. What is the purpose of Invoke-Mimikatz in post-exploitation?

  • A) Extracting credentials from memory
  • B) Running a network scan
  • C) Encrypting communication channels
  • D) Modifying firewall rules

Answer: A) Extracting credentials from memory
Explanation: Invoke-Mimikatz is a PowerShell script that calls Mimikatz for credential dumping.


79. How do attackers use rundll32.exe for stealthy execution?

  • A) By executing malicious DLLs in a legitimate process
  • B) By modifying the Windows kernel
  • C) By disabling Windows updates
  • D) By blocking network traffic

Answer: A) By executing malicious DLLs in a legitimate process
Explanation: Attackers use rundll32.exe to load malicious DLLs, avoiding detection.


80. What does a “Silver Ticket” attack allow an attacker to do?

  • A) Forge service tickets for Kerberos authentication
  • B) Inject malicious JavaScript into webpages
  • C) Capture NTLM hashes over SMB
  • D) Modify domain group policies

Answer: A) Forge service tickets for Kerberos authentication
Explanation: Silver Ticket attacks bypass authentication by forging Kerberos TGS tickets.


81. What command in Linux displays scheduled tasks?

  • A) crontab -l
  • B) netstat -an
  • C) iptables -L
  • D) whoami

Answer: A) crontab -l
Explanation: crontab -l lists all scheduled cron jobs, which attackers may modify for persistence.


82. What does the net use command do in Windows post-exploitation?

  • A) Establishes a connection to remote SMB shares
  • B) Dumps memory contents
  • C) Creates a new domain admin account
  • D) Runs PowerShell scripts

Answer: A) Establishes a connection to remote SMB shares
Explanation: net use allows access to shared folders, which can be exploited for lateral movement.


83. What is an advantage of using a Web Shell in post-exploitation?

  • A) Provides persistent access through a web interface
  • B) Encrypts the entire filesystem
  • C) Forces all users to change their passwords
  • D) Disables security software

Answer: A) Provides persistent access through a web interface
Explanation: Attackers use web shells (e.g., c99.php) to execute commands remotely.


84. What is an example of a persistence mechanism on Windows using DLL hijacking?

  • A) Dropping a malicious DLL into a trusted directory
  • B) Using a SQL Injection attack
  • C) Running a phishing campaign
  • D) Exploiting a router vulnerability

Answer: A) Dropping a malicious DLL into a trusted directory
Explanation: Attackers place malicious DLLs in trusted locations, tricking the system into loading them.


85. What does at.exe allow an attacker to do?

  • A) Schedule tasks for later execution
  • B) Modify Active Directory policies
  • C) Extract password hashes
  • D) Scan for open ports

Answer: A) Schedule tasks for later execution
Explanation: at.exe schedules commands to execute later, often used for persistence.


86. What does the “Golden Ticket” attack allow an attacker to do?

  • A) Create forged Kerberos TGTs for unrestricted access
  • B) Inject malicious payloads into kernel processes
  • C) Brute-force administrator passwords
  • D) Disable Windows Defender

Answer: A) Create forged Kerberos TGTs for unrestricted access
Explanation: Golden Ticket attacks allow attackers to generate Kerberos TGTs, giving persistent domain access.


87. What is the main goal of “Island Hopping” in post-exploitation?

  • A) Moving laterally across multiple connected organizations
  • B) Encrypting user data for ransom
  • C) Exploiting buffer overflows for privilege escalation
  • D) Hijacking network traffic using ARP spoofing

Answer: A) Moving laterally across multiple connected organizations
Explanation: Island Hopping involves using one compromised network to attack another connected network.


88. Which PowerShell command allows an attacker to execute remote scripts without dropping files on disk?

  • A) Invoke-WebRequest
  • B) Get-Process
  • C) netsh firewall off
  • D) whoami /priv

Answer: A) Invoke-WebRequest
Explanation: Attackers use Invoke-WebRequest to download and execute remote payloads without writing them to disk.


89. What persistence technique involves creating a malicious BHO (Browser Helper Object) in Windows?

  • A) DLL Hijacking
  • B) Registry Run Key Injection
  • C) Browser Exploit Persistence
  • D) BHO-based Persistence

Answer: D) BHO-based Persistence
Explanation: BHOs (Browser Helper Objects) are DLLs that run within Internet Explorer, allowing attackers to maintain access.


90. What is the main advantage of using a Domain Controller (DC) as a persistence mechanism?

  • A) It allows for stealthy malware execution
  • B) It provides long-term access with full network control
  • C) It enables brute-force attacks
  • D) It prevents antivirus detection

Answer: B) It provides long-term access with full network control
Explanation: Compromising a DC allows attackers to control authentication, policies, and users across the domain.


91. Which tool is commonly used to extract LSA secrets from a Windows machine?

  • A) BloodHound
  • B) Mimikatz
  • C) Metasploit
  • D) Hydra

Answer: B) Mimikatz
Explanation: Mimikatz extracts LSA secrets, Kerberos tickets, and NTLM hashes for privilege escalation.


92. What attack abuses the SAM and SYSTEM registry hives to retrieve hashed credentials?

  • A) Credential Dumping
  • B) SQL Injection
  • C) NTLM Relay Attack
  • D) Pass-the-Ticket

Answer: A) Credential Dumping
Explanation: Attackers use SAM & SYSTEM hive extraction to retrieve hashed passwords.


93. What is a common persistence technique using Microsoft Office macros?

  • A) Embedding malicious VBA code into Office documents
  • B) Injecting payloads into Windows Defender
  • C) Disabling PowerShell execution policies
  • D) Modifying group policy settings

Answer: A) Embedding malicious VBA code into Office documents
Explanation: Attackers use Office macros to execute malware when documents are opened.


94. How does an attacker use “AppLocker Bypass” for post-exploitation?

  • A) By using whitelisted system binaries to execute malicious code
  • B) By modifying firewall rules
  • C) By brute-forcing administrative credentials
  • D) By disabling event logs

Answer: A) By using whitelisted system binaries to execute malicious code
Explanation: Attackers bypass AppLocker by abusing trusted executables to execute payloads.


95. What is the primary use of “Token Duplication” in post-exploitation?

  • A) To impersonate high-privilege users
  • B) To create new user accounts
  • C) To encrypt network traffic
  • D) To brute-force passwords

Answer: A) To impersonate high-privilege users
Explanation: Token Duplication allows attackers to steal high-privilege user access tokens.


96. What does the “Skeleton Key” malware do in a post-exploitation scenario?

  • A) Enables domain-wide authentication bypass
  • B) Encrypts system files for ransom
  • C) Scans for open ports on a network
  • D) Injects malicious JavaScript into websites

Answer: A) Enables domain-wide authentication bypass
Explanation: Skeleton Key malware allows attackers to bypass Active Directory authentication.


97. What does an attacker achieve with “Registry Run Key Injection”?

  • A) Persistent execution of malicious payloads at system startup
  • B) Brute-forcing password hashes
  • C) Creating new firewall rules
  • D) Scanning network devices

Answer: A) Persistent execution of malicious payloads at system startup
Explanation: Registry Run Key Injection ensures that malicious payloads execute every time the system boots.


98. What does an attacker achieve using “NTLM Relay Attacks”?

  • A) Authenticate to services without cracking passwords
  • B) Bypass file system permissions
  • C) Conduct brute-force login attempts
  • D) Modify Windows firewall settings

Answer: A) Authenticate to services without cracking passwords
Explanation: NTLM Relay Attacks allow authentication without knowing the password, exploiting SMB signing misconfigurations.


99. What technique allows attackers to replace a legitimate Windows service executable with a malicious one?

  • A) Service Binary Path Hijacking
  • B) DLL Injection
  • C) Phishing Attack
  • D) Kerberoasting

Answer: A) Service Binary Path Hijacking
Explanation: Attackers replace the binary path of a legitimate Windows service with a malicious executable, ensuring persistence.


100. What does “Code Cave Injection” involve?

  • A) Injecting malicious code into unused memory space of an executable
  • B) Injecting JavaScript into login forms
  • C) Manipulating kernel memory
  • D) Replacing system drivers

Answer: A) Injecting malicious code into unused memory space of an executable
Explanation: Code Cave Injection places malicious code in an unused portion of an executable’s memory, allowing stealthy execution.


101. What is the primary goal of using “Domain Replication” attacks in post-exploitation?

  • A) Extracting password hashes from Active Directory
  • B) Running privilege escalation exploits
  • C) Deploying ransomware on multiple machines
  • D) Modifying Group Policy settings

Answer: A) Extracting password hashes from Active Directory
Explanation: Domain Replication attacks (e.g., DCSync) abuse Active Directory replication to steal NTLM hashes of all domain users.


102. What is the function of a “C2 beacon” in a post-exploitation framework?

  • A) Establishes communication between the attacker and compromised host
  • B) Scans for vulnerabilities in web applications
  • C) Creates new user accounts on the system
  • D) Encrypts system logs

Answer: A) Establishes communication between the attacker and compromised host
Explanation: C2 (Command & Control) beacons allow attackers to remotely send commands and receive data from compromised machines.


103. What is the advantage of using “Reflective DLL Injection” in post-exploitation?

  • A) Executes malicious DLLs in memory without writing to disk
  • B) Runs scripts on Linux systems
  • C) Prevents antivirus from detecting malware
  • D) Bypasses brute-force protection mechanisms

Answer: A) Executes malicious DLLs in memory without writing to disk
Explanation: Reflective DLL Injection loads a malicious DLL into memory without needing it to be written on disk, reducing AV detection.


104. How can attackers use “Kerberos Overpass-the-Hash” attacks?

  • A) Use NTLM hashes to request Kerberos tickets
  • B) Modify Active Directory group policies
  • C) Intercept network traffic
  • D) Execute JavaScript payloads remotely

Answer: A) Use NTLM hashes to request Kerberos tickets
Explanation: Kerberos Overpass-the-Hash allows attackers to use NTLM hashes to authenticate via Kerberos.


105. What is the purpose of “DLL Search Order Hijacking”?

  • A) Forcing a program to load a malicious DLL instead of a legitimate one
  • B) Disabling Windows firewall rules
  • C) Manipulating NTFS file permissions
  • D) Deleting Windows event logs

Answer: A) Forcing a program to load a malicious DLL instead of a legitimate one
Explanation: DLL Search Order Hijacking abuses how Windows loads DLLs, making an application execute a malicious DLL instead.


106. What technique allows attackers to steal plaintext passwords stored in memory?

  • A) Credential Dumping
  • B) SSH Brute-Forcing
  • C) DNS Tunneling
  • D) Lateral Movement

Answer: A) Credential Dumping
Explanation: Credential Dumping extracts plaintext passwords and hashes from memory (e.g., using Mimikatz).


107. What tool is commonly used for extracting passwords stored in web browsers?

  • A) LaZagne
  • B) Hydra
  • C) Metasploit
  • D) sqlmap

Answer: A) LaZagne
Explanation: LaZagne extracts saved passwords from web browsers, databases, and system credentials.


108. How can attackers use “WMI Event Subscription” for persistence?

  • A) Automatically execute malicious payloads when specific system events occur
  • B) Modify network firewall rules
  • C) Exploit DNS misconfigurations
  • D) Scan for vulnerabilities in SMB shares

Answer: A) Automatically execute malicious payloads when specific system events occur
Explanation: WMI Event Subscription sets up triggers to run malicious scripts or binaries whenever a system event occurs.


109. What is “Service Failure Recovery Persistence” in Windows?

  • A) Configuring a Windows service to restart and execute malicious code on failure
  • B) Injecting malware into system processes
  • C) Hijacking SMB sessions
  • D) Modifying DNS entries

Answer: A) Configuring a Windows service to restart and execute malicious code on failure
Explanation: Attackers configure Windows services to restart and run malicious commands upon failure.


110. How does an attacker use “PowerShell downgrade attacks” in post-exploitation?

  • A) Bypass security restrictions by forcing PowerShell to run in legacy mode
  • B) Prevent PowerShell logging
  • C) Encrypt stolen credentials
  • D) Modify Windows registry settings

Answer: A) Bypass security restrictions by forcing PowerShell to run in legacy mode
Explanation: PowerShell downgrade attacks force PowerShell to execute scripts in an older, less-secure mode.


111. What persistence mechanism exploits “Group Policy Preferences (GPP)”?

  • A) Extracting plaintext credentials from Group Policy XML files
  • B) Injecting malicious JavaScript into GPO rules
  • C) Using scheduled tasks for executing payloads
  • D) Modifying Windows bootloader

Answer: A) Extracting plaintext credentials from Group Policy XML files
Explanation: GPP stores credentials in XML files, allowing attackers to extract plaintext passwords.


112. What is the primary function of “Process Hollowing” in post-exploitation?

  • A) Replacing a legitimate process’s memory with malicious code
  • B) Creating fake system accounts
  • C) Conducting brute-force attacks
  • D) Encrypting all files on the system

Answer: A) Replacing a legitimate process’s memory with malicious code
Explanation: Process Hollowing allows malware to execute inside a trusted process, making it harder to detect.


113. How does “DNS Hijacking” help in maintaining access?

  • A) Redirecting network traffic to attacker-controlled domains
  • B) Encrypting all DNS requests
  • C) Preventing users from accessing the internet
  • D) Generating fake HTTP headers

Answer: A) Redirecting network traffic to attacker-controlled domains
Explanation: DNS Hijacking modifies DNS settings, allowing attackers to redirect victims to malicious websites.


114. What is a common method attackers use to exfiltrate data while evading detection?

  • A) DNS Tunneling
  • B) SQL Injection
  • C) Cross-Site Scripting
  • D) ARP Poisoning

Answer: A) DNS Tunneling
Explanation: DNS Tunneling sends data through DNS queries, bypassing network security controls.


115. What is the goal of “Windows Sticky Notes Injection” in post-exploitation?

  • A) Running malicious commands via sethc.exe
  • B) Using Windows Sticky Notes as a persistence mechanism
  • C) Injecting code into notepad.exe
  • D) Stealing user credentials

Answer: B) Using Windows Sticky Notes as a persistence mechanism
Explanation: Attackers modify Sticky Notes configurations to launch malicious scripts upon execution.


116. What attack abuses “NTFS Alternate Data Streams (ADS)”?

  • A) Hiding malicious payloads inside legitimate files without changing file size
  • B) Injecting malware into system logs
  • C) Manipulating DNS responses
  • D) Creating fake SSL certificates

Answer: A) Hiding malicious payloads inside legitimate files without changing file size
Explanation: ADS in NTFS allows malware to hide inside legitimate files, remaining undetected.


117. How does “LSASS Dumping” help attackers?

  • A) Extracts password hashes and Kerberos tickets from memory
  • B) Hides malicious processes from Task Manager
  • C) Brute-forces Active Directory accounts
  • D) Modifies SMB authentication

Answer: A) Extracts password hashes and Kerberos tickets from memory
Explanation: LSASS Dumping retrieves password hashes and Kerberos tickets for further exploitation.


118. What is the primary goal of “Session Hijacking” in post-exploitation?

  • A) Gaining unauthorized access by stealing an active session token
  • B) Brute-forcing login credentials
  • C) Encrypting session cookies
  • D) Modifying the system’s boot process

Answer: A) Gaining unauthorized access by stealing an active session token
Explanation: Session Hijacking involves stealing authentication tokens to impersonate a legitimate user without needing credentials.


119. How does an attacker use “BitLocker Abuse” for persistence?

  • A) Encrypting critical system files and demanding ransom
  • B) Modifying Windows kernel settings
  • C) Injecting payloads into system processes
  • D) Modifying user permissions

Answer: A) Encrypting critical system files and demanding ransom
Explanation: Attackers may use BitLocker to encrypt files, locking out legitimate users while maintaining control over the system.


120. What is a key characteristic of “Heap Spraying” in post-exploitation?

  • A) Filling memory with predictable data to facilitate exploitation
  • B) Encrypting all stored credentials
  • C) Bypassing network firewall rules
  • D) Stealing password hashes

Answer: A) Filling memory with predictable data to facilitate exploitation
Explanation: Heap Spraying is an exploit technique that prepares memory in a predictable way to increase exploit reliability.


121. How does “Hook Injection” work in post-exploitation?

  • A) Modifying API calls to execute malicious code in targeted processes
  • B) Creating fake login prompts to steal credentials
  • C) Modifying firewall rules to allow malicious traffic
  • D) Hiding malware inside system logs

Answer: A) Modifying API calls to execute malicious code in targeted processes
Explanation: Hook Injection manipulates API function calls to inject and execute malicious code stealthily.


122. What persistence method involves modifying the Windows Boot Configuration Data (BCD)?

  • A) Bootkit Persistence
  • B) DLL Injection
  • C) Token Hijacking
  • D) Phishing Attack

Answer: A) Bootkit Persistence
Explanation: Bootkits modify the BCD or Master Boot Record (MBR) to load malware before the OS boots.


123. What attack involves intercepting and modifying legitimate API calls?

  • A) API Hooking
  • B) DLL Hijacking
  • C) Pass-the-Hash
  • D) Lateral Movement

Answer: A) API Hooking
Explanation: API Hooking allows attackers to modify function calls in real-time, injecting or redirecting execution.


124. What is the main goal of “Clipboard Hijacking” in post-exploitation?

  • A) Monitoring and modifying clipboard data to steal sensitive information
  • B) Disabling clipboard functionality on remote desktops
  • C) Extracting network traffic logs
  • D) Encrypting clipboard contents

Answer: A) Monitoring and modifying clipboard data to steal sensitive information
Explanation: Clipboard Hijacking captures copied passwords, credit card numbers, or cryptocurrency wallet addresses.


125. How does “Reverse Shell Encoding” help evade detection?

  • A) Obfuscating payloads to bypass antivirus and intrusion detection systems
  • B) Encrypting shell commands before execution
  • C) Running exploits inside a virtualized container
  • D) Modifying system BIOS

Answer: A) Obfuscating payloads to bypass antivirus and intrusion detection systems
Explanation: Reverse Shell Encoding disguises malicious commands, making detection harder.


126. What is “Process Doppelgänging” used for in post-exploitation?

  • A) Running malicious code within a legitimate process without detection
  • B) Encrypting all system files
  • C) Conducting brute-force attacks against user accounts
  • D) Spoofing DNS requests

Answer: A) Running malicious code within a legitimate process without detection
Explanation: Process Doppelgänging exploits Windows features to execute malware in a legitimate-looking process.


127. How do attackers abuse “Remote Desktop Protocol (RDP) Shadowing” for persistence?

  • A) Hijacking active RDP sessions without the user noticing
  • B) Scanning for open RDP ports on the network
  • C) Disabling multi-factor authentication on RDP servers
  • D) Bypassing firewall restrictions

Answer: A) Hijacking active RDP sessions without the user noticing
Explanation: RDP Shadowing allows attackers to view and control an active session without alerting the user.


128. What is a key characteristic of “Timestomping” in post-exploitation?

  • A) Modifying file timestamps to evade forensic detection
  • B) Injecting payloads into Windows time synchronization services
  • C) Exploiting time-based authentication tokens
  • D) Manipulating system logs

Answer: A) Modifying file timestamps to evade forensic detection
Explanation: Timestomping alters creation, modification, and access timestamps to make malware appear old and avoid detection.


129. What is “Signed Binary Proxy Execution” used for?

  • A) Running malicious payloads using trusted Microsoft-signed binaries
  • B) Encrypting sensitive user credentials
  • C) Modifying Windows Boot Loaders
  • D) Conducting phishing attacks

Answer: A) Running malicious payloads using trusted Microsoft-signed binaries
Explanation: Signed Binary Proxy Execution abuses trusted Windows executables (e.g., mshta.exe, regsvr32.exe) to execute malware.


130. How does an attacker abuse “Scheduled Task Hijacking” for persistence?

  • A) Modifying existing scheduled tasks to execute malicious scripts
  • B) Encrypting scheduled task logs
  • C) Modifying BIOS settings
  • D) Disabling antivirus software

Answer: A) Modifying existing scheduled tasks to execute malicious scripts
Explanation: Scheduled Task Hijacking allows attackers to alter legitimate task configurations for persistence.


131. What does “Kernel Mode Rootkit” do in post-exploitation?

  • A) Hides malicious activity by running in the OS kernel
  • B) Encrypts user files for ransom
  • C) Injects JavaScript into webpages
  • D) Conducts SQL Injection attacks

Answer: A) Hides malicious activity by running in the OS kernel
Explanation: Kernel Mode Rootkits provide stealthy persistence by modifying OS-level processes.


132. How do attackers use “LDAP Enumeration” in post-exploitation?

  • A) Gather user and group information from Active Directory
  • B) Inject malicious payloads into database queries
  • C) Modify registry keys to disable authentication logs
  • D) Conduct brute-force attacks against user passwords

Answer: A) Gather user and group information from Active Directory
Explanation: LDAP Enumeration provides valuable intelligence on users, groups, and permissions within a Windows domain.


133. What is the primary goal of “Token Impersonation” in post-exploitation?

  • A) Gaining higher privileges by using a stolen authentication token
  • B) Injecting malicious JavaScript into a web application
  • C) Encrypting system logs to evade detection
  • D) Modifying Active Directory group policies

Answer: A) Gaining higher privileges by using a stolen authentication token
Explanation: Token Impersonation allows an attacker to use a stolen security token to execute commands as a higher-privilege user.


134. How does an attacker use “Winlogon Helper DLL Injection” for persistence?

  • A) Injecting malicious DLLs into the Winlogon.exe process to maintain access
  • B) Modifying login credentials stored in the registry
  • C) Exploiting a buffer overflow in Windows login services
  • D) Encrypting user authentication logs

Answer: A) Injecting malicious DLLs into the Winlogon.exe process to maintain access
Explanation: Attackers inject malicious DLLs into Winlogon.exe, ensuring execution every time a user logs in.


135. What is the main purpose of “System Binary Proxy Execution”?

  • A) Using trusted system binaries to execute malicious code
  • B) Modifying system log timestamps to hide activity
  • C) Injecting shellcode into user-mode applications
  • D) Exploiting kernel vulnerabilities for privilege escalation

Answer: A) Using trusted system binaries to execute malicious code
Explanation: System Binary Proxy Execution abuses trusted Windows binaries (e.g., mshta.exe, regsvr32.exe) to execute malware.


136. What is the purpose of “Web Cache Poisoning” in post-exploitation?

  • A) Injecting malicious content into cached web responses to target users
  • B) Hiding malware inside encrypted SSL sessions
  • C) Bypassing security measures by modifying DNS settings
  • D) Disabling Content Security Policy (CSP)

Answer: A) Injecting malicious content into cached web responses to target users
Explanation: Web Cache Poisoning manipulates cached web content, allowing attackers to serve malicious responses to victims.


137. How does “AppInit DLL Injection” help an attacker maintain persistence?

  • A) Loading a malicious DLL into every user-mode process that uses user32.dll
  • B) Exploiting API misconfigurations to escalate privileges
  • C) Injecting shellcode into browser processes
  • D) Manipulating Windows boot sequence

Answer: A) Loading a malicious DLL into every user-mode process that uses user32.dll
Explanation: AppInit DLL Injection ensures malicious DLLs load into every process using user32.dll, maintaining persistence.


138. What is the purpose of “Reverse Port Forwarding” in post-exploitation?

  • A) Establishing access from the victim’s internal network back to the attacker’s machine
  • B) Modifying remote firewall configurations
  • C) Encrypting communication between an attacker and the victim
  • D) Spoofing ARP requests to intercept network traffic

Answer: A) Establishing access from the victim’s internal network back to the attacker’s machine
Explanation: Reverse Port Forwarding allows an attacker to bypass NAT/firewall restrictions and maintain remote access.


139. How do attackers use “LOLBins” (Living Off the Land Binaries) for post-exploitation?

  • A) Executing malicious payloads using trusted system binaries
  • B) Modifying Active Directory group policies
  • C) Conducting brute-force attacks against user passwords
  • D) Injecting exploits into kernel-mode drivers

Answer: A) Executing malicious payloads using trusted system binaries
Explanation: LOLBins (e.g., certutil.exe, mshta.exe, rundll32.exe) are trusted binaries used for malicious execution.


140. How does “Ghosting” help attackers evade detection?

  • A) Creating a file that appears deleted but is still accessible
  • B) Masking a malicious process as a legitimate one
  • C) Modifying the BIOS to execute malware before the OS loads
  • D) Running payloads in a sandbox environment

Answer: A) Creating a file that appears deleted but is still accessible
Explanation: Ghosting allows an attacker to create files that appear deleted but remain accessible, bypassing forensic tools.


141. What is the purpose of “UAC Bypass” in post-exploitation?

  • A) Running malware with administrative privileges without triggering User Account Control prompts
  • B) Injecting malicious scripts into Windows event logs
  • C) Modifying DNS settings to redirect user traffic
  • D) Exploiting buffer overflows in Windows security policies

Answer: A) Running malware with administrative privileges without triggering User Account Control prompts
Explanation: UAC Bypass exploits whitelisted executables to elevate privileges without user interaction.


142. How does “Process Hollowing” help attackers evade detection?

  • A) Injecting malicious code into a legitimate process, replacing its memory space
  • B) Executing PowerShell commands without logging
  • C) Spoofing IP addresses in network traffic
  • D) Encrypting all user data before exfiltration

Answer: A) Injecting malicious code into a legitimate process, replacing its memory space
Explanation: Process Hollowing allows malware to execute under a trusted process name, evading detection.


143. What is “ASR Bypass” in Windows security evasion?

  • A) Disabling Attack Surface Reduction (ASR) rules to allow malicious execution
  • B) Exploiting SQL vulnerabilities to extract data
  • C) Injecting exploits into Bluetooth devices
  • D) Modifying Active Directory policies

Answer: A) Disabling Attack Surface Reduction (ASR) rules to allow malicious execution
Explanation: ASR Bypass allows attackers to disable Microsoft’s Attack Surface Reduction rules, reducing security controls.


144. How do attackers use “VBA Stomping” in malware delivery?

  • A) Embedding malicious macros in Microsoft Office documents without detection
  • B) Modifying the Windows registry to execute malware
  • C) Spoofing legitimate email addresses for phishing attacks
  • D) Brute-forcing administrator passwords

Answer: A) Embedding malicious macros in Microsoft Office documents without detection
Explanation: VBA Stomping hides malicious macros in Office documents, avoiding signature-based detection.


145. What is the purpose of “Password Spraying” in post-exploitation?

  • A) Attempting a few commonly used passwords across many accounts to avoid detection
  • B) Brute-forcing a single account with multiple password attempts
  • C) Encrypting user passwords in Active Directory
  • D) Injecting JavaScript into login pages

Answer: A) Attempting a few commonly used passwords across many accounts to avoid detection
Explanation: Password Spraying avoids account lockouts by testing weak passwords against multiple users.


146. How does “TrustedInstaller Abuse” allow attackers to gain persistence?

  • A) Running code with system-level privileges by hijacking TrustedInstaller.exe
  • B) Encrypting user files before exfiltration
  • C) Modifying Active Directory schema for unauthorized access
  • D) Conducting privilege escalation via browser vulnerabilities

Answer: A) Running code with system-level privileges by hijacking TrustedInstaller.exe
Explanation: TrustedInstaller Abuse allows attackers to execute malware with SYSTEM privileges, bypassing standard restrictions.


147. What is the purpose of “Remote Thread Injection” in post-exploitation?

  • A) Injecting malicious code into another process’s memory space
  • B) Running a brute-force attack on a remote server
  • C) Hijacking a user’s network session
  • D) Encrypting all system logs

Answer: A) Injecting malicious code into another process’s memory space
Explanation: Remote Thread Injection creates a new thread inside a legitimate process to execute malicious payloads stealthily.


148. How does “Hollow Process Injection” help attackers evade detection?

  • A) Replacing the memory of a legitimate process with malicious code
  • B) Encrypting stolen credentials before exfiltration
  • C) Modifying registry keys to disable logging
  • D) Using social engineering to trick users

Answer: A) Replacing the memory of a legitimate process with malicious code
Explanation: Hollow Process Injection launches a trusted process but replaces its memory with malicious payloads, making detection harder.


149. What is “Phantom DLL Hijacking” used for in post-exploitation?

  • A) Loading malicious DLLs when the system searches for non-existent ones
  • B) Injecting JavaScript into browser sessions
  • C) Exploiting an SQL database misconfiguration
  • D) Spoofing MAC addresses for anonymity

Answer: A) Loading malicious DLLs when the system searches for non-existent ones
Explanation: Phantom DLL Hijacking exploits applications that try to load missing DLLs, allowing attackers to place malicious DLLs in expected locations.


150. How does “AutoRun Persistence” help attackers maintain access?

  • A) Placing malicious scripts in Windows startup locations
  • B) Bypassing multifactor authentication
  • C) Encrypting payloads to avoid detection
  • D) Using DNS tunneling for data exfiltration

Answer: A) Placing malicious scripts in Windows startup locations
Explanation: AutoRun Persistence ensures that malicious payloads execute at every system startup, keeping access active.


151. What is the primary function of “COM Hijacking” in persistence?

  • A) Modifying Windows Component Object Model (COM) registry keys to execute malware
  • B) Encrypting critical system files to demand ransom
  • C) Running brute-force attacks against domain accounts
  • D) Modifying BIOS firmware

Answer: A) Modifying Windows Component Object Model (COM) registry keys to execute malware
Explanation: COM Hijacking exploits Windows COM objects, replacing them with malicious entries to maintain persistence.


152. How does an attacker use “WMI Backdoor” for persistence?

  • A) Using Windows Management Instrumentation (WMI) to execute commands stealthily
  • B) Injecting malware into the BIOS
  • C) Running exploits through an SQL database
  • D) Encrypting Windows event logs

Answer: A) Using Windows Management Instrumentation (WMI) to execute commands stealthily
Explanation: WMI Backdoors use event triggers to execute malicious commands on target systems without requiring a file.


153. What is the advantage of using “Process Injection” over traditional malware execution?

  • A) Runs malicious code within legitimate processes, avoiding detection
  • B) Requires less system memory
  • C) Provides faster network access
  • D) Encrypts all system processes

Answer: A) Runs malicious code within legitimate processes, avoiding detection
Explanation: Process Injection hides malware execution inside legitimate processes, making it harder to detect.


154. How does “Kernel Callback Injection” help attackers bypass security mechanisms?

  • A) Manipulating kernel callbacks to execute malicious code in kernel mode
  • B) Spoofing network traffic logs
  • C) Encrypting system files for ransom
  • D) Running brute-force attacks

Answer: A) Manipulating kernel callbacks to execute malicious code in kernel mode
Explanation: Kernel Callback Injection abuses Windows kernel callbacks, giving attackers high-privilege execution.


155. What is the primary purpose of “APC Injection” in post-exploitation?

  • A) Queueing malicious code for execution within a running thread
  • B) Encrypting user credentials before exfiltration
  • C) Running a phishing attack against system admins
  • D) Injecting malware into BIOS firmware

Answer: A) Queueing malicious code for execution within a running thread
Explanation: Asynchronous Procedure Call (APC) Injection schedules malicious execution within existing threads, reducing detection.


156. What is the role of “Fileless Malware” in evading security solutions?

  • A) Executes entirely in memory without writing files to disk
  • B) Disguises itself as a system driver
  • C) Injects payloads into the boot sector
  • D) Uses brute-force attacks to gain access

Answer: A) Executes entirely in memory without writing files to disk
Explanation: Fileless Malware operates in memory, avoiding traditional antivirus file scans.


157. How does “Kerberos Ticket Granting Ticket (TGT) Theft” benefit attackers?

  • A) Grants long-term access to Active Directory without requiring reauthentication
  • B) Encrypts all system logs to avoid detection
  • C) Modifies firewall rules to allow persistent access
  • D) Runs brute-force attacks against domain controllers

Answer: A) Grants long-term access to Active Directory without requiring reauthentication
Explanation: Stealing a Kerberos TGT allows attackers to continue accessing resources without re-entering credentials.


158. What persistence technique involves modifying “Image File Execution Options (IFEO)”?

  • A) Replacing default debugger paths to execute malicious payloads
  • B) Encrypting Windows system files
  • C) Running exploits against Active Directory
  • D) Injecting payloads into PowerShell scripts

Answer: A) Replacing default debugger paths to execute malicious payloads
Explanation: IFEO Hijacking modifies debugger paths in the registry, making Windows execute malware instead of legitimate applications.


159. How does “Password Filter DLL Injection” help attackers?

  • A) Capturing plaintext passwords during system authentication
  • B) Disabling security features in Windows Defender
  • C) Encrypting exfiltrated credentials
  • D) Running ransomware payloads

Answer: A) Capturing plaintext passwords during system authentication
Explanation: Password Filter DLL Injection allows attackers to hook into Windows authentication processes and steal passwords.


160. What is the primary goal of “NTFS Extended Attributes Abuse” in post-exploitation?

  • A) Hiding malware within NTFS file attributes without altering file size
  • B) Encrypting Windows event logs
  • C) Modifying firewall rules to maintain persistence
  • D) Spoofing system calls to evade detection

Answer: A) Hiding malware within NTFS file attributes without altering file size
Explanation: NTFS Extended Attributes Abuse lets attackers hide payloads inside file metadata, making them invisible in regular directory listings.


161. What is the primary goal of “Security Descriptor Modification” in post-exploitation?

  • A) Changing access control permissions to maintain unauthorized access
  • B) Injecting malware into security logs
  • C) Modifying BIOS firmware for persistence
  • D) Running brute-force attacks against Windows Defender

Answer: A) Changing access control permissions to maintain unauthorized access
Explanation: Security Descriptor Modification allows attackers to alter permissions on files, registry keys, or services to maintain control.


162. How does “SID-History Injection” help attackers maintain access?

  • A) Adding stolen security identifiers to an account to gain elevated privileges
  • B) Injecting malware into kernel processes
  • C) Encrypting all Active Directory credentials
  • D) Running brute-force attacks on SSH servers

Answer: A) Adding stolen security identifiers to an account to gain elevated privileges
Explanation: SID-History Injection allows attackers to add a previously privileged SID to their account, bypassing authentication checks.


163. What is “Hidden Scheduled Task Persistence” in Windows?

  • A) Creating a scheduled task that does not appear in normal task listings
  • B) Encrypting user login credentials for later use
  • C) Spoofing network traffic to hide from monitoring tools
  • D) Exploiting PowerShell vulnerabilities to execute remote code

Answer: A) Creating a scheduled task that does not appear in normal task listings
Explanation: Hidden Scheduled Tasks are crafted to remain invisible to standard administrative tools, ensuring persistence.


164. What attack method exploits “Group Managed Service Accounts (gMSA)” for persistence?

  • A) Extracting cached credentials for later use
  • B) Brute-forcing service account passwords
  • C) Injecting malware into Active Directory logs
  • D) Using PowerShell to disable security policies

Answer: A) Extracting cached credentials for later use
Explanation: gMSA credentials are often cached, allowing attackers to extract them and authenticate without detection.


165. What is “Remote COM Object Hijacking” used for in post-exploitation?

  • A) Executing malicious commands through COM objects on remote systems
  • B) Modifying Windows registry keys to disable authentication logs
  • C) Injecting payloads into browser processes
  • D) Encrypting files before exfiltration

Answer: A) Executing malicious commands through COM objects on remote systems
Explanation: Remote COM Object Hijacking allows attackers to remotely execute payloads via Windows COM objects.


166. How does “Application Shimming” help attackers evade detection?

  • A) Modifying Windows Application Compatibility settings to load malicious code
  • B) Encrypting stolen data before exfiltration
  • C) Injecting payloads into system processes
  • D) Running ransomware payloads on boot

Answer: A) Modifying Windows Application Compatibility settings to load malicious code
Explanation: Application Shimming abuses Microsoft’s Application Compatibility features to execute malware stealthily.


167. What is the purpose of “Process Ghosting” in post-exploitation?

  • A) Executing malicious processes that never appear in forensic analysis
  • B) Injecting JavaScript into session cookies
  • C) Modifying SMB settings to allow anonymous access
  • D) Running exploits on outdated TLS protocols

Answer: A) Executing malicious processes that never appear in forensic analysis
Explanation: Process Ghosting allows malware to execute without being seen in process monitoring tools.


168. How does “PowerShell Constrained Language Mode Bypass” help attackers?

  • A) Disabling PowerShell security restrictions to execute unrestricted commands
  • B) Running a phishing attack against system administrators
  • C) Spoofing system update messages to trick users
  • D) Modifying the BIOS firmware to execute malware at boot

Answer: A) Disabling PowerShell security restrictions to execute unrestricted commands
Explanation: PowerShell Constrained Language Mode Bypass allows attackers to override security controls that prevent script execution.


169. What is “Custom Protocol Handler Exploitation” used for?

  • A) Executing malicious code by abusing registered protocol handlers in Windows
  • B) Spoofing DNS responses to redirect users to fake login pages
  • C) Disabling Windows Defender via registry modifications
  • D) Injecting payloads into SQL databases

Answer: A) Executing malicious code by abusing registered protocol handlers in Windows
Explanation: Custom Protocol Handler Exploitation leverages misconfigured URL handlers to execute commands on the victim’s machine.


170. How does “Netlogon Elevation of Privilege Exploit” help attackers?

  • A) Gaining domain admin access by exploiting authentication flaws in Netlogon
  • B) Injecting shellcode into Active Directory logs
  • C) Brute-forcing Kerberos tickets
  • D) Spoofing domain administrator credentials

Answer: A) Gaining domain admin access by exploiting authentication flaws in Netlogon
Explanation: The Netlogon Elevation of Privilege exploit (e.g., CVE-2020-1472, Zerologon) allows attackers to impersonate domain administrators.


171. What is the purpose of “Kernel Object Hooking” in post-exploitation?

  • A) Modifying kernel structures to hide malicious activity
  • B) Exploiting buffer overflow vulnerabilities
  • C) Encrypting all stored credentials before exfiltration
  • D) Running brute-force attacks on VPN connections

Answer: A) Modifying kernel structures to hide malicious activity
Explanation: Kernel Object Hooking alters kernel-level structures to mask malware and prevent detection.


172. How does “User Mode Rootkit” differ from a Kernel Mode Rootkit?

  • A) It operates within standard user processes instead of kernel space
  • B) It only targets mobile devices
  • C) It modifies BIOS firmware instead of user files
  • D) It encrypts all network communications

Answer: A) It operates within standard user processes instead of kernel space
Explanation: User Mode Rootkits function within user applications, making them easier to deploy but less stealthy than Kernel Mode Rootkits.


173. What is the purpose of “NTLM Hash Injection” in post-exploitation?

  • A) Authenticating as a legitimate user without knowing their password
  • B) Spoofing email addresses for phishing attacks
  • C) Encrypting NTFS partitions to prevent access
  • D) Modifying SMB configurations to allow anonymous access

Answer: A) Authenticating as a legitimate user without knowing their password
Explanation: NTLM Hash Injection allows attackers to use stolen hashes to authenticate without cracking passwords.


174. How do attackers use “SMB Named Pipe Impersonation” for privilege escalation?

  • A) Creating rogue named pipes to intercept high-privilege processes
  • B) Brute-forcing NTLM hashes to gain system access
  • C) Injecting payloads into SMB file shares
  • D) Modifying DNS entries for redirection

Answer: A) Creating rogue named pipes to intercept high-privilege processes
Explanation: SMB Named Pipe Impersonation tricks Windows into treating the attacker’s malicious pipe as a legitimate system pipe.


175. What persistence method uses “Active Setup Registry Keys” in Windows?

  • A) Running malware every time a new user logs in
  • B) Encrypting PowerShell logs to avoid detection
  • C) Running scheduled tasks under SYSTEM privileges
  • D) Spoofing VPN connections

Answer: A) Running malware every time a new user logs in
Explanation: Active Setup Registry Keys execute specified commands each time a new user profile is created.


176. What is the purpose of “Windows Sticky Notes Injection” in persistence?

  • A) Embedding malicious payloads into Sticky Notes for execution
  • B) Injecting malware into Windows boot sectors
  • C) Modifying BIOS firmware to execute malware before the OS loads
  • D) Encrypting user credentials before exfiltration

Answer: A) Embedding malicious payloads into Sticky Notes for execution
Explanation: Sticky Notes Injection allows attackers to embed scripts or payloads within Sticky Notes, ensuring execution upon system startup.


177. How does “Sysmon Evasion” help attackers maintain stealth in post-exploitation?

  • A) Disabling or bypassing Microsoft Sysmon logs to avoid detection
  • B) Encrypting malware binaries to bypass antivirus
  • C) Manipulating event log timestamps to prevent forensic analysis
  • D) Injecting shellcode into legitimate processes

Answer: A) Disabling or bypassing Microsoft Sysmon logs to avoid detection
Explanation: Sysmon Evasion techniques involve disabling logging, modifying rules, or clearing logs to prevent security monitoring.


178. What is “Rootkit Hypervisor Injection” used for in post-exploitation?

  • A) Running a malicious hypervisor beneath the OS to control system execution
  • B) Encrypting all files in a hidden partition
  • C) Extracting passwords from memory using direct kernel access
  • D) Brute-forcing NTLM authentication tokens

Answer: A) Running a malicious hypervisor beneath the OS to control system execution
Explanation: Rootkit Hypervisor Injection allows attackers to install a malicious hypervisor below the OS, intercepting all operations undetected.


179. How do attackers use “Windows Services Hijacking” for persistence?

  • A) Modifying legitimate services to execute malicious payloads on startup
  • B) Overwriting system binaries with malicious code
  • C) Disabling Windows Defender using registry modifications
  • D) Spoofing user accounts to gain higher privileges

Answer: A) Modifying legitimate services to execute malicious payloads on startup
Explanation: Windows Services Hijacking involves modifying existing system services to execute attacker-controlled payloads upon system restart.


180. What is “Kerberos Ticket Injection” in post-exploitation?

  • A) Injecting forged Kerberos tickets to bypass authentication
  • B) Manipulating Active Directory logs to erase attack traces
  • C) Extracting password hashes from NTDS.dit
  • D) Spoofing DNS requests for network redirection

Answer: A) Injecting forged Kerberos tickets to bypass authentication
Explanation: Kerberos Ticket Injection allows attackers to generate and inject forged TGT or TGS tickets to impersonate domain users.


181. What is the purpose of “EtwTi ByPass” in evading detection?

  • A) Disabling Event Tracing for Windows (ETW) and Threat Intelligence (Ti) logging
  • B) Encrypting all system logs before exfiltration
  • C) Using alternate authentication methods to bypass security policies
  • D) Running brute-force attacks against Kerberos authentication

Answer: A) Disabling Event Tracing for Windows (ETW) and Threat Intelligence (Ti) logging
Explanation: EtwTi Bypass prevents Windows Defender and security tools from detecting malicious activity by disabling telemetry logging.


182. How does “Named Pipe Impersonation” help attackers escalate privileges?

  • A) Creating malicious named pipes that intercept system processes
  • B) Encrypting network traffic to hide communication
  • C) Injecting shellcode into Active Directory services
  • D) Modifying NTFS permissions to allow remote execution

Answer: A) Creating malicious named pipes that intercept system processes
Explanation: Named Pipe Impersonation allows attackers to intercept privileged processes and escalate privileges.


183. What is “Indirect Syscall Execution” in post-exploitation?

  • A) Executing system calls without direct interaction to evade security hooks
  • B) Spoofing authentication tokens to bypass MFA
  • C) Injecting shellcode into PowerShell scripts
  • D) Brute-forcing NTLM authentication

Answer: A) Executing system calls without direct interaction to evade security hooks
Explanation: Indirect Syscall Execution allows malware to bypass security monitoring tools by avoiding direct API calls.


184. What is the primary use of “OAuth Token Theft” in post-exploitation?

  • A) Gaining unauthorized access to cloud services using stolen OAuth tokens
  • B) Injecting malicious code into email services
  • C) Running privilege escalation exploits on VPN connections
  • D) Manipulating authentication logs to prevent detection

Answer: A) Gaining unauthorized access to cloud services using stolen OAuth tokens
Explanation: OAuth Token Theft allows attackers to access cloud-based accounts and applications without requiring passwords.


185. How does “Memory Module Stomping” help attackers evade detection?

  • A) Overwriting the memory of legitimate modules with malicious code
  • B) Encrypting files before exfiltration
  • C) Bypassing multifactor authentication on Windows systems
  • D) Modifying BIOS firmware to execute malware at startup

Answer: A) Overwriting the memory of legitimate modules with malicious code
Explanation: Memory Module Stomping ensures that malicious code executes within trusted processes, bypassing security scans.


186. What is the goal of “Reverse Port Binding” in post-exploitation?

  • A) Establishing a remote connection by binding a service to a local port
  • B) Encrypting exfiltrated data before sending it to an attacker
  • C) Modifying Windows Defender exclusions via registry changes
  • D) Injecting JavaScript into active web sessions

Answer: A) Establishing a remote connection by binding a service to a local port
Explanation: Reverse Port Binding allows attackers to open local ports that listen for attacker connections, bypassing outbound firewalls.


187. How does “Active Directory Shadow Credentials Exploitation” allow persistence?

  • A) Creating a rogue authentication certificate to impersonate users
  • B) Overwriting password hashes in NTDS.dit
  • C) Spoofing domain administrator logins using stolen hashes
  • D) Encrypting authentication logs to evade detection

Answer: A) Creating a rogue authentication certificate to impersonate users
Explanation: Shadow Credentials Exploitation enables attackers to register unauthorized authentication certificates for domain persistence.


188. What is the purpose of “Office Add-in Persistence” in post-exploitation?

  • A) Embedding malicious VBA code into Office add-ins for automatic execution
  • B) Modifying Windows registry keys to disable logging
  • C) Encrypting stored credentials before exfiltration
  • D) Running brute-force attacks on Outlook accounts

Answer: A) Embedding malicious VBA code into Office add-ins for automatic execution
Explanation: Office Add-in Persistence allows attackers to execute malicious code when users open Office applications.


189. How does “Remote Desktop Credential Hijacking” help attackers?

  • A) Stealing plaintext RDP session credentials for unauthorized access
  • B) Injecting malware into Windows Remote Desktop Services
  • C) Modifying security policies to disable logging
  • D) Running a ransomware payload through an RDP connection

Answer: A) Stealing plaintext RDP session credentials for unauthorized access
Explanation: RDP Credential Hijacking allows attackers to extract stored credentials from active RDP sessions.


190. What is “Pluggable Authentication Module (PAM) Backdoor” in Linux post-exploitation?

  • A) Creating a malicious PAM module to allow stealthy authentication
  • B) Modifying sudo configurations to escalate privileges
  • C) Injecting shellcode into SSH sessions
  • D) Encrypting authentication logs before exfiltration

Answer: A) Creating a malicious PAM module to allow stealthy authentication
Explanation: PAM Backdoors enable attackers to authenticate as any user without detection, bypassing normal login restrictions.


191. How does “Cloud Instance Metadata Abuse” help attackers maintain access?

  • A) Extracting temporary access tokens from cloud instance metadata services
  • B) Modifying cloud firewall rules to allow persistence
  • C) Encrypting cloud storage to demand ransom
  • D) Injecting malicious scripts into cloud-based APIs

Answer: A) Extracting temporary access tokens from cloud instance metadata services
Explanation: Cloud Metadata Abuse allows attackers to extract IAM credentials or temporary session tokens from services like AWS EC2, Azure, or GCP.


192. What is “Local Port Forwarding” used for in post-exploitation?

  • A) Redirecting network traffic from a local port to a remote system
  • B) Encrypting stolen credentials before exfiltration
  • C) Modifying Windows Defender exclusions via registry keys
  • D) Bypassing two-factor authentication on cloud services

Answer: A) Redirecting network traffic from a local port to a remote system
Explanation: Local Port Forwarding allows attackers to expose internal services externally by forwarding traffic through a compromised host.


193. What is the purpose of “Application Whitelisting Bypass” in post-exploitation?

  • A) Executing malware by abusing trusted applications that are allowed to run
  • B) Modifying BIOS firmware to execute malicious payloads
  • C) Extracting passwords from NTDS.dit on a domain controller
  • D) Running brute-force attacks on OAuth tokens

Answer: A) Executing malware by abusing trusted applications that are allowed to run
Explanation: Whitelisting Bypass allows attackers to use legitimate system binaries (LOLBins) like mshta.exe, certutil.exe, or rundll32.exe to execute malicious payloads.


194. How do attackers use “SSH Agent Hijacking” to maintain access?

  • A) Hijacking an existing SSH agent session to authenticate without needing credentials
  • B) Injecting malicious payloads into SSH configuration files
  • C) Modifying firewall rules to allow SSH brute-force attacks
  • D) Disabling security monitoring on Linux servers

Answer: A) Hijacking an existing SSH agent session to authenticate without needing credentials
Explanation: SSH Agent Hijacking allows attackers to reuse cached authentication credentials to access remote servers without requiring passwords.


195. What is the primary goal of “IPv6 Tunneling Abuse” in post-exploitation?

  • A) Bypassing security controls by encapsulating traffic within IPv6 packets
  • B) Encrypting all network traffic between compromised hosts
  • C) Modifying DNS records to redirect users to malicious websites
  • D) Injecting payloads into HTTP headers

Answer: A) Bypassing security controls by encapsulating traffic within IPv6 packets
Explanation: IPv6 Tunneling is used to bypass security appliances that do not properly inspect IPv6 traffic, allowing hidden C2 communications.


196. What is “Quark Engine Bypass” in post-exploitation?

  • A) Evading Quark Engine malware analysis on macOS
  • B) Injecting malicious PowerShell scripts into scheduled tasks
  • C) Exploiting Kerberos authentication vulnerabilities
  • D) Manipulating web application firewalls to allow SQL injection

Answer: A) Evading Quark Engine malware analysis on macOS
Explanation: Quark Engine Bypass involves modifying execution flow or obfuscating payloads to prevent detection on macOS malware analysis engines.


197. How does “Windows Error Reporting (WER) Abuse” help attackers evade detection?

  • A) Hijacking Windows Error Reporting services to execute malicious payloads
  • B) Disabling event logging for failed authentication attempts
  • C) Injecting payloads into active RDP sessions
  • D) Encrypting forensic logs to hide evidence

Answer: A) Hijacking Windows Error Reporting services to execute malicious payloads
Explanation: WER Abuse allows attackers to misuse Windows error reporting features to run malicious processes under a trusted system service.


198. What is “DNS Over HTTPS (DoH) Abuse” used for in post-exploitation?

  • A) Exfiltrating data stealthily by encrypting DNS queries inside HTTPS requests
  • B) Injecting malicious JavaScript into HTTPS requests
  • C) Modifying DNS records to redirect network traffic
  • D) Running brute-force attacks on DNS servers

Answer: A) Exfiltrating data stealthily by encrypting DNS queries inside HTTPS requests
Explanation: DNS Over HTTPS (DoH) Abuse enables attackers to evade network monitoring tools by tunneling malicious traffic inside encrypted DNS requests.


199. How does “Task Scheduler Abuse” help attackers maintain persistence?

  • A) Creating hidden scheduled tasks to execute malware automatically
  • B) Modifying system startup scripts to disable antivirus
  • C) Encrypting the Windows registry to store payloads
  • D) Injecting PowerShell scripts into system processes

Answer: A) Creating hidden scheduled tasks to execute malware automatically
Explanation: Task Scheduler Abuse allows attackers to schedule malicious processes to execute at set intervals or on system startup, maintaining persistence.


200. What is the purpose of “System Token Duplication” in privilege escalation?

  • A) Copying a high-privilege security token and using it for unauthorized access
  • B) Spoofing authentication headers to bypass web security controls
  • C) Encrypting stolen credentials before exfiltration
  • D) Injecting payloads into biometric authentication systems

Answer: A) Copying a high-privilege security token and using it for unauthorized access
Explanation: System Token Duplication allows attackers to steal and reuse privileged tokens (e.g., SYSTEM tokens) to escalate privileges without cracking passwords.