Which macOS persistence mechanism can be installed to run at boot by loading a plist via launchd/launchctl?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which macOS persistence mechanism can be installed to run at boot by loading a plist via launchd/launchctl?

Explanation:
In macOS, persistence at boot through a plist loaded by launchd/launchctl is accomplished with a Launch Daemon. A Launch Daemon is a system-wide service defined by a plist placed in /Library/LaunchDaemons. This plist specifies what to run (Program or ProgramArguments) and can include RunAtLoad to start automatically when launchd loads it at boot. Since these daemons run as root, they provide persistence across reboots. This setup is distinct from Launch Agents, which run per user after login, not at system boot. Sudo is just a privilege escalation tool, not a startup item. Kernel exploits and web shells are different attack methods and not the mechanism described.

In macOS, persistence at boot through a plist loaded by launchd/launchctl is accomplished with a Launch Daemon. A Launch Daemon is a system-wide service defined by a plist placed in /Library/LaunchDaemons. This plist specifies what to run (Program or ProgramArguments) and can include RunAtLoad to start automatically when launchd loads it at boot. Since these daemons run as root, they provide persistence across reboots. This setup is distinct from Launch Agents, which run per user after login, not at system boot. Sudo is just a privilege escalation tool, not a startup item. Kernel exploits and web shells are different attack methods and not the mechanism described.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy