nerdexam
CompTIACompTIA

PT0-003 · Question #58

PT0-003 Question #58: Real Exam Question with Answer & Explanation

The correct answer is D: attacker_host$ proxychains nmap -sT <target_cidr>. The proxychains tool allows penetration testers to route their network traffic through an intermediate (compromised) host, enabling lateral movement and stealthy reconnaissance. By running Nmap with proxychains, the tester can scan the target network while routing the traffic thr

Submitted by javi_es· Mar 6, 2026Post-exploitation and Lateral Movement

Question

A penetration tester established an initial compromise on a host. The tester wants to pivot to other targets and set up an appropriate relay. The tester needs to enumerate through the compromised host as a relay from the tester's machine. Which of the following commands should the tester use to do this task from the tester's host?

Options

  • Aattacker_host$ nmap -sT <target_cidr> | nc -n <compromised_host> 22
  • Battacker_host$ mknod backpipe p
  • Cattacker_host$ nc -nlp 8000 | nc -n <target_cidr>
  • Dattacker_host$ proxychains nmap -sT <target_cidr>

Explanation

The proxychains tool allows penetration testers to route their network traffic through an intermediate (compromised) host, enabling lateral movement and stealthy reconnaissance. By running Nmap with proxychains, the tester can scan the target network while routing the traffic through the compromised host, effectively using it as a pivot point.

Topics

#pivoting#proxychains#lateral movement#network relay

Community Discussion

No community discussion yet for this question.

Full PT0-003 PracticeBrowse All PT0-003 Questions