Question: Question 2 3 ( 2 points ) Many time, machines will communicate with other systems and servers. Through identification of these systems, an attacker can
Question points
Many time, machines will communicate with other systems and servers. Through
identification of these systems, an attacker can exploit other machines. What
command would work on a Linux machine to identify these systems?
netstat na
arp a
ifconfig displaydns
ipconfig displaydns
Question points
Metasploit allows an attacker to capture keystrokes; logging in real time what the
user on the target system is typing. This begins with the keyscanstart command. To
see the results of the logged keystrokes you need to use which command?
keyscandump
keyscanshow
keyscandisplay
keyscanstop
Question points
What does the following command do
$ nc
set up a netcat client on port
set up a netcat listener on port
set up a netcat client on port
set up a netcat listener on port
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
