97.5k views
1 vote
A PenTester has successfully exploited a remote host on a clients’ network. They want to create a backdoor on the host for future access and decide to open a telnet server on the exploited host. Three steps are required. What is the proper sequence of commands to successfully create this backdoor?

User Babacar
by
5.7k points

1 Answer

2 votes

Answer:

The following Commands are:

  • First, sc config TlntSvr start=auto ;
  • Second, net start TlntSvr ;
  • Third, netsh firewall add portopening TCP 23 "Telnet"

Step-by-step explanation:

Telnet is the protocol which allows user to connect with the remote computers (called as hosts) over the TCP/IP(Transmission Control Protocol/Internet Protocol) networks (such as an internet). Using the telnet clients' software on the user's computer, they can make the connections to the telnet server.

User John Nelson
by
5.1k points