ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 227 - PT0-002 discussion

Report
Export

A penetration tester exploited a vulnerability on a server and remotely ran a payload to gain a shell.

However, a connection was not established, and no errors were shown on the payload execution. The penetration tester suspected that a network device, like an IPS or next-generation firewall, was dropping the connection. Which of the following payloads are MOST likely to establish a shell successfully?

A.
windows/x64/meterpreter/reverse_tcp
Answers
A.
windows/x64/meterpreter/reverse_tcp
B.
windows/x64/meterpreter/reverse_http
Answers
B.
windows/x64/meterpreter/reverse_http
C.
windows/x64/shell_reverse_tcp
Answers
C.
windows/x64/shell_reverse_tcp
D.
windows/x64/powershell_reverse_tcp
Answers
D.
windows/x64/powershell_reverse_tcp
E.
windows/x64/meterpreter/reverse_https
Answers
E.
windows/x64/meterpreter/reverse_https
Suggested answer: B

Explanation:

These two payloads are most likely to establish a shell successfully because they use HTTP or HTTPS protocols, which are commonly allowed by network devices and can bypass firewall rules or IPS signatures. The other payloads use TCP protocols, which are more likely to be blocked or detected by network devices.

asked 02/10/2024
xczzxc zzxczxxz
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first