A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use?
mr_robot
Highly Voted 5 years agoTheThreatGuy
4 years, 3 months agokloug
Most Recent 2 years, 2 months agomiabe
2 years, 9 months agoSetsunarcangel
3 years agojon34thna
5 years, 2 months agoD1960
5 years, 2 months agoTheThreatGuy
4 years, 3 months agoD1960
5 years, 2 months ago