An ethical hacker is using the Metasploit tool to exploit an FTP server and pivot to a LAN. Which of the following is a feasible approach?
A. Issue the pivot exploit and set the meterpreter.
B. Reconfigure the network settings in the meterpreter.
C. Set the payload to propagate through the meterpreter.
D. Create a route statement in the meterpreter.
Answers
Answered by
14
Answer:
D
Explanation:
Answered by
2
Answer:
A
Explanation:
as hacker is exploiting FTP server & pivoting LAN then he will first break into the first network and then use it as a staging point to exploit and hack the internal machines of the second network. This process is known as pivoting because the hacker is using the first network as a pivot to get access into the second network
I'm not sure BTW
Similar questions
Computer Science,
5 months ago
Math,
5 months ago
Math,
5 months ago
English,
11 months ago
Business Studies,
11 months ago
Biology,
1 year ago
Biology,
1 year ago