A PenTester has successfully exploited a remote host on a clients’ network. They want to create a backdoor on the host for future access and decide to open a telnet server on the exploited host. Three steps are required. What is the proper sequence of commands to successfully create this backdoor?

Answer :

Limosa

Answer:

The following Commands are:

  • First, sc config TlntSvr start=auto ;
  • Second, net start TlntSvr ;
  • Third, netsh firewall add portopening TCP 23 "Telnet"

Explanation:

Telnet is the protocol which allows user to connect with the remote computers (called as hosts) over the TCP/IP(Transmission Control Protocol/Internet Protocol) networks (such as an internet). Using the telnet clients' software on the user's computer, they can make the connections to the telnet server.

Other Questions