Which of the following would be the BEST command to use for further progress into the targeted network?
autonumA CentOS computer was exploited during a penetration test. During initial reconnaissance, the penetration tester discovered that port 25 was open on an internal Sendmail server.
To remain stealthy, the tester ran the following command from the attack machine: 

Which of the following would be the BEST command to use for further progress into the targeted network?
A . nc 10.10.1.2
B . ssh 10.10.1.2
C . nc 127.0.0.1 5555
D . ssh 127.0.0.1 5555
Answer: C
Latest PT0-002 Dumps Valid Version with 110 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments
                 
	