which of the following stages of the hacker process does this activity belong?

An attacker has used a malformed UDP packet to elicit a response from a system and leave
behind a root shell. To which of the following stages of the hacker process does this activity
belong?

An attacker has used a malformed UDP packet to elicit a response from a system and leave
behind a root shell. To which of the following stages of the hacker process does this activity
belong?

A.
Penetration

B.
Discovery

C.
Control

D.
Attack

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *