Question 36:
A penetration tester has obtained root access to a Linux-based file server and would like to maintain persistence after reboot. Which of the following techniques would BEST support this objective?
Answer options:
A. Create a one-shot systemd service to establish a reverse shell. B. Obtain /etc/shadow and brute force the root password. C. Run the nc -e /bin/sh <...> command. D. Move laterally to create a user account on LDAP