A CentOS computer was exploited during a penetration test. During initial reconnaissance, the penetration tester discovered that port 25 was open on an internal
Sendmail server. To remain stealthy, the tester ran the following command from the attack machine:
Which of the following would be the BEST command to use for further progress into the targeted network?
som3onenooned1
Highly Voted 2 years, 7 months agoEtc_Shadow28000
Most Recent 11 months, 4 weeks agonickwen007
2 years, 3 months agokloug
2 years, 4 months agoRRabbit_111
2 years, 5 months ago