List of questions
Related questions
Question 186 - PT0-002 discussion
A CentOS computer was exploited during a penetration test. During initial reconnaissance, the penetration tester discovered that port 25 was open on an internal Sendmail server. To remain stealthy, the tester ran the following command from the attack machine:
Which of the following would be the BEST command to use for further progress into the targeted network?
A.
nc 10.10.1.2
B.
ssh 10.10.1.2
C.
nc 127.0.0.1 5555
D.
ssh 127.0.0.1 5555
Your answer:
0 comments
Sorted by
Leave a comment first