List of questions
Related questions
Question 366 - 312-50v12 discussion
You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System. What is the best approach?
A.
Use Alternate Data Streams to hide the outgoing packets from this server.
B.
Use HTTP so that all traffic can be routed vis a browser, thus evading the internal IntrusionDetection Systems.
C.
Install Cryptcat and encrypt outgoing packets from this server.
D.
Install and use Telnet to encrypt all outgoing traffic from this server.
Your answer:
0 comments
Sorted by
Leave a comment first