Q: 3
[Attacks and Exploits]
Which of the following activities should be performed to prevent uploaded web shells from being
exploited by others?
Options
Discussion
A , since removing persistence like web shells is the key step to stop further exploitation. Official Pentest+ guide and lab scenarios usually point to this approach.
For me, A. To actually prevent reuse, you've got to remove the persistence methods like web shells. C is more about keeping evidence for forensics, but that doesn't stop others from exploiting it. Seen similar question in practice sets. Not 100% sure-happy to hear other takes.
Not D, A. Makes sense to get rid of the persistence part first right? Unsure though, anyone else get this?
Be respectful. No spam.