After gaining access to a dual-homed (i.e., wired and wireless) multifunction device by exploiting a vulnerability
in the device's firmware, a penetration tester then gains shell access on another networked asset. This
technique is an example of:
A. privilege escalation.
B. footprinting.
C. persistence.
D. pivoting.
in the device's firmware, a penetration tester then gains shell access on another networked asset. This
technique is an example of:
A. privilege escalation.
B. footprinting.
C. persistence.
D. pivoting.