Which technique involves modifying plist files to execute code at startup and to escalate privileges?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which technique involves modifying plist files to execute code at startup and to escalate privileges?

Explanation:
Modifying plist files on macOS takes advantage of launchd to run code at startup. A plist (Property List) defines a launch item—what to execute, with which parameters, and when (for example, RunAtLoad). By editing or placing a plist in system-wide locations like /Library/LaunchDaemons (which run with root privileges) and enabling RunAtLoad, the payload can execute automatically when the system boots, enabling persistence and potential privilege escalation. This focus on altering the plist configuration is what makes it the best description of the technique, since it directly describes how startup execution and elevated privileges can be achieved.

Modifying plist files on macOS takes advantage of launchd to run code at startup. A plist (Property List) defines a launch item—what to execute, with which parameters, and when (for example, RunAtLoad). By editing or placing a plist in system-wide locations like /Library/LaunchDaemons (which run with root privileges) and enabling RunAtLoad, the payload can execute automatically when the system boots, enabling persistence and potential privilege escalation. This focus on altering the plist configuration is what makes it the best description of the technique, since it directly describes how startup execution and elevated privileges can be achieved.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy