Which of the following commands should the tester run on the compromised system?

A penetration tester has compromised a system and wishes to connect to a port on it from the attacking machine to control the system.

Which of the following commands should the tester run on the compromised system?
A . nc looalhot 4423
B . nc -nvlp 4423 -« /bin/bash
C . nc 10.0.0.1 4423
D . nc 127.0.0.1 4423 -e /bin/bash

Answer: B

Latest PT0-001 Dumps Valid Version with 248 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments