73.5k views
2 votes
While investigating a potential security breach on a Windows machine, you list the commands that have recently been executed from the command line and find the following: arp -a, set username, set computername, net localgroup administrators, and tasklist. There are other commands as well. While then checking the running processes, you see the output below in Task Manager. It's clear that someone has compromised the Windows machine. What would you call the phase of the attack that you have found?

User Hemflit
by
7.5k points

1 Answer

3 votes

Answer:

Based on the information provided, it appears that the attacker has executed several reconnaissance commands to gather information about the compromised system and its network environment. The commands arp -a, set username, set computername, net localgroup administrators, and tasklist are commonly used for reconnaissance purposes. Additionally, the fact that the attacker has launched several processes in the task manager indicates that they may be attempting to establish persistence on the compromised system, which is a key objective of the post-exploitation phase of an attack. Therefore, it is likely that the phase of the attack that has been found is the post-exploitation phase, which typically involves reconnaissance, establishing persistence, and expanding access to other systems on the network.

User Kevin Kalitowski
by
7.3k points