Which of the following can be used to escape the limited shell and create a fully functioning TTY?
After successfully exploiting a local file inclusion vulnerability within a web application a limited reverse shell is spawned back to the penetration tester’s workstation.
Which of the following can be used to escape the limited shell and create a fully functioning TTY?
A . per1 -e ‘ : set shall=/bin/bash:shell’
B . php -r ,Sshell=f3hellopen("/bin/bash-);exec($9he:i)’
C . bash -i >fi /dev/localhosc Oil
D . python -c ‘import pty;pcy.3pawn("/bin/bash")’
Answer: D
Latest PT0-001 Dumps Valid Version with 248 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments