During a web application assessment, a penetration tester discovers that arbitrary commands can be executed on the server. Wanting to take this attack one step further, the penetration tester begins to explore ways to gain a reverse shell back to the attacking machine at 192.168.1.5. Which of the following are possible ways to do so? (Select TWO).
NoImDirtyDan
Highly Voted 4 years, 9 months agoTheThreatGuy
4 years, 3 months agomr_robot
Highly Voted 4 years, 10 months agoboblee
4 years, 10 months agobyrne
4 years, 5 months agokloug
Most Recent 2 years, 2 months agokloug
2 years, 2 months agomiabe
2 years, 9 months agobrandonl
3 years, 1 month agobrandonl
3 years, 1 month agoRTFM
3 years, 2 months agoHollarStudent_999
3 years, 9 months agoCybersec1989
3 years, 7 months agoIsuzu
3 years, 10 months agodeathfrom
5 years agoD1960
5 years, 2 months agozgwy
5 years, 7 months agowho__cares123456789___
4 years, 3 months ago