During which Kill Chain stage does the attacker download additional malware to maintain access and may install a backdoor?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

During which Kill Chain stage does the attacker download additional malware to maintain access and may install a backdoor?

Explanation:
The Installation stage is when an attacker sets up persistence by installing malware or a backdoor after gaining access. Once initial access is achieved, the attacker drops or downloads additional components to maintain control, often configuring ongoing footholds and backdoor access that survive reboots or further actions. This is exactly what the scenario describes: downloading extra malware to keep access and install a backdoor. Delivery involves getting the initial payload to the target, Exploitation is using a vulnerability to execute code, and Reconnaissance is gathering information before a break-in. The actions in question occur after access is obtained, at the stage focused on establishing and preserving that access.

The Installation stage is when an attacker sets up persistence by installing malware or a backdoor after gaining access. Once initial access is achieved, the attacker drops or downloads additional components to maintain control, often configuring ongoing footholds and backdoor access that survive reboots or further actions. This is exactly what the scenario describes: downloading extra malware to keep access and install a backdoor.

Delivery involves getting the initial payload to the target, Exploitation is using a vulnerability to execute code, and Reconnaissance is gathering information before a break-in. The actions in question occur after access is obtained, at the stage focused on establishing and preserving that access.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy