Which technique involves modifying plist files to execute code at startup and to escalate privileges?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which technique involves modifying plist files to execute code at startup and to escalate privileges?

Explanation:
Modifying plist files on macOS takes advantage of launchd to run code at startup. A plist (Property List) defines a launch item—what to execute, with which parameters, and when (for example, RunAtLoad). By editing or placing a plist in system-wide locations like /Library/LaunchDaemons (which run with root privileges) and enabling RunAtLoad, the payload can execute automatically when the system boots, enabling persistence and potential privilege escalation. This focus on altering the plist configuration is what makes it the best description of the technique, since it directly describes how startup execution and elevated privileges can be achieved.

Modifying plist files on macOS takes advantage of launchd to run code at startup. A plist (Property List) defines a launch item—what to execute, with which parameters, and when (for example, RunAtLoad). By editing or placing a plist in system-wide locations like /Library/LaunchDaemons (which run with root privileges) and enabling RunAtLoad, the payload can execute automatically when the system boots, enabling persistence and potential privilege escalation. This focus on altering the plist configuration is what makes it the best description of the technique, since it directly describes how startup execution and elevated privileges can be achieved.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy