A penetration tester has performed a pivot to a new Linux device on a different network. The tester writes the following command: for m in {1..254..1};do ping -c 1 192.168.101.$m; done
Which of the following BEST describes the result of running this command?
D1960
Highly Voted 5 years, 2 months agomr_robot
5 years, 2 months agowho__cares123456789___
4 years, 4 months agowho__cares123456789___
4 years, 4 months agomiabe
Most Recent 2 years, 11 months ago