ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 186 - PT0-002 discussion

Report
Export

A CentOS computer was exploited during a penetration test. During initial reconnaissance, the penetration tester discovered that port 25 was open on an internal Sendmail server. To remain stealthy, the tester ran the following command from the attack machine:

Which of the following would be the BEST command to use for further progress into the targeted network?

A.
nc 10.10.1.2
Answers
A.
nc 10.10.1.2
B.
ssh 10.10.1.2
Answers
B.
ssh 10.10.1.2
C.
nc 127.0.0.1 5555
Answers
C.
nc 127.0.0.1 5555
D.
ssh 127.0.0.1 5555
Answers
D.
ssh 127.0.0.1 5555
Suggested answer: C
asked 02/10/2024
Christophe Troessaert
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first