A third-party penetration testing company was able to successfully use an ARP cache poison technique to gain root access on a server.
The tester successfully moved to another server that was not in the original network.
Which of the following is the MOST likely method used to gain access to the other host?
Click on the arrows to vote for the correct answer
A. B. C. D.B.
The most likely method used to gain access to the other host after using ARP cache poison technique to gain root access on the server is Pivoting.
Pivoting is a technique used in penetration testing to move from one compromised host to another host that is not directly accessible or outside the target network. Once the attacker has gained access to a compromised host, they can use this host to launch attacks on other systems on the same network or on different networks.
In this scenario, the attacker used ARP cache poison technique to gain root access on the server, which means they were able to manipulate the ARP cache of the server to redirect network traffic through their own system. This gave them complete control over the network traffic, which allowed them to intercept and modify any network packets passing through the compromised server.
With this level of access, the attacker could use the compromised server as a launching pad to target other servers that were not directly accessible. The attacker could use various techniques to gain access to other servers, such as exploiting vulnerabilities in the target systems or using stolen credentials to authenticate to other systems.
In conclusion, the most likely method used by the attacker to gain access to the other host is pivoting, as it is a common technique used by attackers to move laterally within a network after compromising a single host.