A penetration tester successfully exploits a DMZ server that appears to be listening on an outbound port. The penetration tester wishes to forward that traffic back to a device. Which of the following are the BEST tools to use for this purpose? (Choose two.)
kabwitte
Highly Voted 4 years, 12 months agomr_robot
Highly Voted 5 years, 2 months agodeathfrom
5 years, 2 months agoD1960
5 years, 1 month agoD1960
5 years, 1 month agomr_robot
5 years, 1 month agoD1960
5 years, 1 month agokloug
Most Recent 2 years, 4 months agomiabe
2 years, 11 months agoJetlife
3 years, 2 months agoCock
3 years, 4 months agoMrRiver
3 years, 9 months agodyers
4 years, 1 month agodyers
4 years, 1 month agomacr0sss
4 years, 1 month agoMo911
4 years, 3 months agoharej8
4 years, 7 months agoTheThreatGuy
4 years, 5 months agodyers
4 years, 1 month agoNoImDirtyDan
4 years, 11 months agoboblee
5 years agokabwitte
4 years, 12 months agomr_robot
4 years, 11 months agoddiggler
3 years, 8 months agoD1960
5 years, 1 month agowho__cares123456789___
4 years, 5 months agoD1960
5 years, 1 month agoTeacher6
5 years, 2 months agoD1960
5 years, 1 month agowho__cares123456789___
4 years, 5 months agoAriel235788
3 years, 8 months agoMusaad
5 years, 2 months ago