GCIH Exam QuestionsBrowse all questions from this exam

GCIH Exam - Question 197


An organization has an SSH server that was compromised. Given the following evidence, what most likely occurred?

Show Answer
Correct Answer: D

The evidence shows the use of 'nc' (netcat) with the flags '-l -p 23 -e /bin/sh', which indicates that a netcat listener was set up to execute a shell when a connection is made. This is typically used to create a backdoor that allows an attacker to access the system remotely. Based on this evidence, it is clear that an attacker accessed the system through a backdoor using netcat.

Discussion

1 comment
Sign in to comment
Vikt0rOption: D
Dec 5, 2023

D look at NC (netcat)