PT0-003 · Question #7
PT0-003 Question #7: Real Exam Question with Answer & Explanation
The correct answer is B: Netcat. If a penetration tester gains access to a host but does not have a shell, the best tool for further enumeration is Netcat. Versatility: Netcat is known as the "Swiss Army knife" of networking tools. It can be used for port scanning, banner grabbing, and setting up reverse shells.
Question
A penetration tester gains access to a host but does not have access to any type of shell. Which of the following is the best way for the tester to further enumerate the host and the environment in which it resides?
Options
- AProxyChains
- BNetcat
- CPowerShell ISE
- DProcess IDs
Explanation
If a penetration tester gains access to a host but does not have a shell, the best tool for further enumeration is Netcat. Versatility: Netcat is known as the "Swiss Army knife" of networking tools. It can be used for port scanning, banner grabbing, and setting up reverse shells. Enumeration: Without a shell, Netcat can help enumerate open ports and services running on the host, providing insight into the host's environment.
Topics
Community Discussion
No community discussion yet for this question.