A penetration tester compromised a system and wants to connect to a port on the system from the attacking machine in order to control the system. Which of the following commands should the tester run on the compromised system?
D. nc -nvlp 5555 -e /bin/bash
-n: No DNS resolution.
-v: Verbose mode.
-l: Listen mode.
-p 5555: Specify the port number (5555).
-e /bin/bash: Execute the bash shell upon connection.
This command sets up a netcat listener on port 5555 and provides an interactive bash shell to the attacker once a connection is established.
This command uses Netcat (nc) to establish a connection from the compromised system to the attacking machine (through the local loopback address 127.0.0.1). The -e /bin/bash option tells Netcat to execute /bin/bash (or a shell) upon connection, which allows the tester to interact with the compromised system and control it remotely. However, this command is executed on the compromised system and initiates the connection.
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.PT0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Snagggggin
Highly Voted 3 months, 1 week agostudy_study
Most Recent 1 month, 1 week ago