96.2k views
0 votes
A security engineer has been hired to design a device that will enable the exfiltration of data from within a well-defended network perimeter during an authorized test. The device must bypass all firewalls and NIDS in place, as well as allow for the upload of commands from a centralized command and control server . The total cost of the device must be kept to a minimum in case the device is discovered during an assessment.

Which of the following tools should the engineer load onto the device being designed?

A. Custom firmware with rotating key generation
B. Automatic MITM proxy
C. TCP beacon broadcast software
D. Reverse shell endpoint listener

1 Answer

3 votes

Final answer:

The most appropriate tool to use in this scenario would be a Reverse shell endpoint listener as it provides a means to bypass firewalls and NIDS for data exfiltration and commands upload during an authorized test.

Step-by-step explanation:

The student is asking which tool should be loaded onto a device designed for exfiltrating data during an authorized test while bypassing security measures. The most effective and relevant option would be D. Reverse shell endpoint listener. This tool would allow the security engineer to initiate a connection from the target network back to the command-and-control server, effectively bypassing firewalls and Network Intrusion Detection Systems (NIDS) which typically monitor inbound connections. Custom firmware with rotating key generation is relevant for encryption and authentication, but not specifically for bypassing network defenses. An automatic Man-In-The-Middle (MITM) proxy could be useful for manipulating traffic, but it is more relevant for intercepting communication rather than establishing a connection with a C2 server. TCP beacon broadcast software might help to signal a presence but does not set up a channel for command upload or data exfiltration effectively as required.

User GuillaumeA
by
7.9k points