adplus-dvertising
frame-decoration

Question

Ian wants to drop a tool on a compromised system that will allow him to set up a reverse shell. Which of the following tools should he select?

a.

Aircrack-ng

b.

Nmap

c.

Netcat

d.

Censys

Answer: (c).Netcat Explanation:Netcat is the only tool from this list that can be used as a reverse shell. It can also be used for basic port scanning and a variety of other network attacks and testing purposes. Aircrack-ng is used for network penetration testing, nmap is a port scanner, and Censys is a search engine that can be used for open-source intelligence work.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Ian wants to drop a tool on a compromised system that will allow him to set up a reverse shell. Which of the following tools should he select?

Similar Questions

Discover Related MCQs

Q. Steve has set his penetration testing workstation up for an on-path attack between his target and an FTP server. What is the best method for him to acquire FTP credentials?

Q. As part of a penetration test Mariana uses a tool that uses the same username and password from a list on many target systems and then uses the next username and password from its list. Which of the following terms best describes the attack she is using?

Q. Michelle wants to capture NFC communications as part of a penetration test. What is the most critical factor in her ability to intercept the communication?

Q. Cassandra wants to attack a WPS-enabled system. What attack technique can she use against it?

Q. What type of Bluetooth attack attempts to send unsolicited messages via Bluetooth devices?

Q. What attack technique can allow the pentester visibility into traffic on VLANs other than their native VLAN?

Q. Chris is conducting an on-site penetration test. The test is a gray-box test, and he is permitted on-site but has not been given access to the wired or wireless networks. He knows he needs to gain access to both to make further progress.Once Chris has gained access to the network, what technique can he use to gather additional credentials?

Q. Chris is conducting an on-site penetration test. The test is a gray-box test, and he is permitted on-site but has not been given access to the wired or wireless networks. He knows he needs to gain access to both to make further progress. If Chris wants to set up a false AP, which tool is best suited to his needs?

Q. Chris is conducting an on-site penetration test. The test is a gray-box test, and he is permitted on-site but has not been given access to the wired or wireless networks. He knows he needs to gain access to both to make further progress. Which of the following NAC systems would be the easiest for Chris to bypass?

Q. Charles wants to deploy a wireless intrusion detection system. Which of the following tools is best suited to that purpose?

Q. Why are Windows NetBIOS and SMB services popular targets for penetration testers?

Q. What on-path attacks can penetration testers conduct via ARP spoofing?

Q. What is a high-value target for penetration testers once they have gained network access?

Q. What technique can be useful for a penetration tester to gain network access in a wireless network?

Q. What may be required to gain access to a wired network in an on-site penetration test?

Q. How can repeating traffic or conducting a relay attack be useful for a penetration tester?

Q. In what situation might wireless DoS be a legitimate technique for penetration testers?

Q. What technology makes it possible to clone high-frequency 13.56 MHz RFID cards with phones?

Q. Which type of RFID cards can be cloned using readily available cloning tools?

Q. What type of attack is Fern primarily known for?