Exam GCIH All QuestionsBrowse all questions from this exam
Question 197

An organization has an SSH server that was compromised. Given the following evidence, what most likely occurred?

    Correct Answer: D

    The evidence shows the use of 'nc' (netcat) with the flags '-l -p 23 -e /bin/sh', which indicates that a netcat listener was set up to execute a shell when a connection is made. This is typically used to create a backdoor that allows an attacker to access the system remotely. Based on this evidence, it is clear that an attacker accessed the system through a backdoor using netcat.

Discussion
Vikt0rOption: D

D look at NC (netcat)