List of questions
Related questions
Question 88 - PT0-003 discussion
A penetration tester established an initial compromise on a host. The tester wants to pivot to other targets and set up an appropriate relay. The tester needs to enumerate through the compromised host as a relay from the tester's machine. Which of the following commands should the tester use to do this task from the tester's host?
A.
attacker_host$ nmap -sT <target_cidr> | nc -n <compromised_host> 22
B.
attacker_host$ mknod backpipe p attacker_host$ nc -l -p 8000 | 0<backpipe | nc <target_cidr> 80 | tee backpipe
C.
attacker_host$ nc -nlp 8000 | nc -n <target_cidr> attacker_host$ nmap -sT 127.0.0.1 8000
D.
attacker_host$ proxychains nmap -sT <target_cidr>
Your answer:
0 comments
Sorted by
Leave a comment first