A penetration tester successfully exploits a DMZ server that appears to be listening on an outbound port. The penetration tester wishes to forward that traffic back to a device. Which of the following are the BEST tools to use for this purpose? (Choose two.)
kabwitte
Highly Voted 4 years, 9 months agomr_robot
Highly Voted 5 years agodeathfrom
5 years agoD1960
4 years, 11 months agoD1960
4 years, 11 months agomr_robot
4 years, 11 months agoD1960
4 years, 12 months agokloug
Most Recent 2 years, 2 months agomiabe
2 years, 9 months agoJetlife
3 years agoCock
3 years, 2 months agoMrRiver
3 years, 7 months agodyers
3 years, 11 months agodyers
3 years, 11 months agomacr0sss
3 years, 11 months agoMo911
4 years, 1 month agoharej8
4 years, 5 months agoTheThreatGuy
4 years, 3 months agodyers
3 years, 11 months agoNoImDirtyDan
4 years, 9 months agoboblee
4 years, 10 months agokabwitte
4 years, 9 months agomr_robot
4 years, 9 months agoddiggler
3 years, 6 months agoD1960
4 years, 11 months agowho__cares123456789___
4 years, 2 months agoD1960
4 years, 12 months agoTeacher6
5 years agoD1960
4 years, 11 months agowho__cares123456789___
4 years, 2 months agoAriel235788
3 years, 6 months agoMusaad
5 years ago