Assignment 5

profileStarr0804

In this exercise, you will need to download a Windows-based image from https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/


1. How does a kernel debugger work?

2. How can you detect a rootkit using WinDbg?

3. What happens when a rootkit hooks SSDT? Please describe in detail.

4. Why is easier to penetrate an x-86 system?


1. What is a reverse-shell?

2. What is the command to setup a reverse shell?

3 .Describe in detail how a RAT works.

4. How does pass-the-hash work?

    • 4 months ago
    • 10
    Answer(1)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      StudentsName.docx