A penetration tester compromises a system that has unrestricted network access over port 443 to any host. The penetration tester wants to create a reverse shell from the victim back to the attacker. Which of the following methods would the penetration tester MOST likely use?
mr_robot
Highly Voted 5 years, 3 months agoTheThreatGuy
4 years, 6 months agokloug
Most Recent 2 years, 4 months agomiabe
3 years agoSetsunarcangel
3 years, 3 months agojon34thna
5 years, 4 months agoD1960
5 years, 4 months agoTheThreatGuy
4 years, 6 months agoD1960
5 years, 4 months ago