CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA PenTest+ PT0-002 Practice Question

As you establish a foothold within a network during an internal penetration test, you've identified a server with a strict outbound firewall policy that prevents reverse shells from connecting to your machine. Your next step is to maintain access with a bind shell. Due to the firewall restrictions, which of the following techniques would allow the compromised server to listen for your connection while minimizing the risk of detection by the network intrusion detection system?

  • Configure the shell to listen on a commonly monitored port like 4444, expecting penetration testers to use it.

  • Bind the shell to a common port like 80/http to blend in with normal traffic, relying on the obscurity for protection.

  • Wrap the bind shell traffic with SSL and use a port allowed by the firewall policy.

  • Avoid using a shell by relying solely on periodic command execution to achieve a similar outcome.

Subscribe to avoid duplicate questions and track your progress over time
This question is for objective:
Attacks and Exploits
Your Score:
Attacks and Exploits
Information Gathering and Vulnerability Scanning
Reporting and Communication
Tools and Code Analysis
Planning and Scoping