After gaining initial access on a Windows host, you want interactive sessions on additional systems through the built-in graphical service. Which action is most likely to provide a stable connection to those systems?
Install a hidden application that records keystrokes and streams the desktop to your machine
Leverage compromised credentials to sign in using the existing utility and navigate to other hosts
Create a new registry key to modify essential processes and bypass the login screen
Set regular automated tasks that execute a graphical client at certain intervals
Leveraging valid accounts with sufficient rights to sign in through the built-in Windows graphical utility tends to arouse less scrutiny and keeps an active channel for deeper exploration. Installing custom monitoring tools or tampering with system settings may lead to detection or unreliable access. Using scheduled tasks alone might not be effective for maintaining continual interactive control.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the built-in Windows graphical utility used for remote connections?
Open an interactive chat with Bash
Why is leveraging compromised credentials less detectable?
Open an interactive chat with Bash
What are the risks of using keylogging or custom monitoring tools instead?