Jonathan is an IT Security consultant working for Innovative Security, an IT auditing company in Houston. Jonathan has just been hired on to audit the network of a large law firm company in Houston. Jonathan starts his work by perfoming some initial passive scans and social engineering. He then uses Angry IP to scan for live hosts on the firm’s network. After finding some live IP addresses, he attempts some firewalking techniques to bypass the firewall using ICMP but the firewall blocks this traffic. Jonathan decides to use HPING2 to hopefully bypass the firewall this time. He types in the following command:
What is Jonathan trying to accomplish by using HPING2?
A.
Jonathan is attempting to send spoofed SYN packets to the target via a trusted third part to port 81.
B.
He is using HPING2 to send FIN packets to 10.0.1.24 over port 81.
C.
By using this command for HPING2, Jonathan is attempting to connect to the host at 10.0.1.24 through an SSH shell.
D.
This HPING2 command that Jonathan is using will attempt to connect to the 10.0.1.24 host over HTTP by tunneling through port 81.
Correct answer is A