Question: Question 2 3 ( 2 points ) Many time, machines will communicate with other systems and servers. Through identification of these systems, an attacker can

Question 23(2 points)
Many time, machines will communicate with other systems and servers. Through
identification of these systems, an attacker can exploit other machines. What
command would work on a Linux machine to identify these systems?
netstat -na
arp -a
ifconfig /displaydns
ipconfig /displaydns
Question 24(2 points)
Metasploit allows an attacker to capture keystrokes; logging in real time what the
user on the target system is typing. This begins with the keyscan_start command. To
see the results of the logged keystrokes you need to use which command?
keyscan_dump
keyscan_show
keyscan_display
keyscan_stop
Question 25(2 points)
What does the following command do?
$ nc 10.10.10.1022
set up a netcat client on port 22
set up a netcat listener on port 10.10.10.10
set up a netcat client on port 10.10.10.10
set up a netcat listener on port 22
Question 2 3 ( 2 points ) Many time, machines

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!