perform ARP spoofing while maintaining a reliable connection?

A penetration tester is performing a remote internal penetration test by connecting to the testing system from the Internet via a reverse SSH tunnel. The testing system has been placed on a general user subnet with an IP address of 192.168.1.13 and a gateway of 192.168.1.1.

Immediately after running the command below, the penetration tester’s SSH connection to the testing platform drops:

Which of the following ettercap commands should the penetration tester use in the future to

perform ARP spoofing while maintaining a reliable connection?
A . # sudo ettercap CTq Cw output.cap CM ARP /192.168.1.0/ /192.168.1.255/
B . # proxychains ettercap CTq Cw output.cap CM ARP /192.168.1.13/ /192.168.1.1/
C . # ettercap CTq Cw output.cap CM ARP 00:00:00:00:00:00//80 FF:FF:FF:FF:FF:FF//80
D . # ettercap CCsafe-mode CTq Cw output.cap CM ARP /192.168.1.2C 255/ /192.168.1.13/
E . # ettercap CTq Cw output.cap CM ARP /192.168.1.2C12;192.168.1.14C 255/ /192.168.1.1/

Answer: A

Latest PT0-001 Dumps Valid Version with 248 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments