Refer to the exhibit. The attacking system has a listener (port open), and the victim initiates a connection back to the attacking system. Which two resources can create this type of malicious activity? (Choose two.)

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:January 28, 2024
  • Reading time:2 mins read

Refer to the exhibit. The attacking system has a listener (port open), and the victim initiates a connection back to the attacking system. Which two resources can create this type of malicious activity? (Choose two.)

Ethical Hacker Course Final Exam Answers 04
Ethical Hacker Course Final Exam Answers 04
  • Empire
  • Steghide
  • Sysinternals
  • BloodHound
  • Netcat
Explanation & Hints:

The malicious activity described in the scenario is a reverse shell. Many tools allow the creation of reverse shells from a compromised host. Some of the most popular ones are the Meterpreter module in Metasploit and Netcat. Empire is an open-source framework with PowerShell Windows and Python Linux agents that allows rapid deployment of post-exploitation modules, including keyloggers, bind shells, reverse shells, Mimikatz, and adaptable communication to evade detection.

For more Questions and Answers:

Ethical Hacker Course Final Exam Answers Full 100%

5 1 vote
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments