PT0-003 · Question #58
PT0-003 Question #58: Real Exam Question with Answer & Explanation
The correct answer is D: attacker_host$ proxychains nmap -sT <target_cidr>. The proxychains tool allows penetration testers to route their network traffic through an intermediate (compromised) host, enabling lateral movement and stealthy reconnaissance. By running Nmap with proxychains, the tester can scan the target network while routing the traffic thr
Question
A penetration tester established an initial compromise on a host. The tester wants to pivot to other targets and set up an appropriate relay. The tester needs to enumerate through the compromised host as a relay from the tester's machine. Which of the following commands should the tester use to do this task from the tester's host?
Options
- Aattacker_host$ nmap -sT <target_cidr> | nc -n <compromised_host> 22
- Battacker_host$ mknod backpipe p
- Cattacker_host$ nc -nlp 8000 | nc -n <target_cidr>
- Dattacker_host$ proxychains nmap -sT <target_cidr>
Explanation
The proxychains tool allows penetration testers to route their network traffic through an intermediate (compromised) host, enabling lateral movement and stealthy reconnaissance. By running Nmap with proxychains, the tester can scan the target network while routing the traffic through the compromised host, effectively using it as a pivot point.
Topics
Community Discussion
No community discussion yet for this question.