Caution During Cybersecurity Engagements
In cybersecurity engagements, there are occasions when attack techniques may leave traces within a client’s infrastructure or, in more concerning cases, involve the use of malicious, backdoored tools.
This post provides brief examples that responsible professionals should be aware of to ensure they exercise proper caution during and after the engagement.
Malicious Tools
During a web application pentest, imagine gaining remote access to your client’s Linux server but with limited privileges. The client then permits you to attempt privilege escalation to sudo
.