1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
1 year ago
12

An attacker compromises a Linux host, installing a web shell as a backdoor. If the attacker gained access to the host through a

connection the host established, what type of attack has occurred?
Computers and Technology
1 answer:
OverLord2011 [107]1 year ago
5 0

Reverse shell is known to be the type of attack that is said to have occurred in the above case.

<h3>What is reverse shell?</h3>

A reverse shell is said to be “connect-back shell,” and it is one that often takes advantage of the computer weakness of the target to start a shell session and it often access the victim's system.

Hence, Reverse shell is known to be the type of attack that is said to have occurred in the above case.

See options below

A.) Man-in-the-Browser (MitB)

B.) Reverse shell

C.) Rootkit

D.) Session hijacking

Learn more about Reverse shell from

brainly.com/question/16607263

#SPJ1

You might be interested in
What is an 8086 microprocessor used for
Liula [17]
A sixteen bit microprocessor chip used in early IBM PCs. The Intel 8088 was a version with an eight-bit externaldata bus.

The Intel 8086 was based on the design of the Intel 8080 <span>and </span>Intel 8085 (it was source compatible with the 8080)with a similar register set, but was expanded to 16 bits. The Bus Interface Unit fed the instruction stream to theExecution Unit through a 6 byte prefetch queue, so fetch and execution were concurrent - a primitive form ofpipelining (8086 instructions varied from 1 to 4 bytes).

It featured four 16-bit general registers, which could also be accessed as eight 8-bit registers, and four 16-bit indexregisters (including the stack pointer). The data registers were often used implicitly by instructions, complicatingregister allocation for temporary values. It featured 64K 8-bit I/O (or 32K 16 bit) ports and fixed vectored interrupts.There were also four segment registers that could be set from index registers.

The segment registers allowed the CPU to access 1 meg of memory in an odd way. Rather than just supplyingmissing bytes, as most segmented processors, the 8086 actually shifted the segment registers left 4 bits and addedit to the address. As a result, segments overlapped, and it was possible to have two pointers with the same valuepoint to two different memory locations, or two pointers with different values pointing to the same location. Mostpeople consider this a brain damaged design.

Although this was largely acceptable for assembly language, where control of the segments was complete (it couldeven be useful then), in higher level languages it caused constant confusion (e.g. near/far pointers). Even worse, thismade expanding the address space to more than 1 meg difficult. A later version, the Intel 80386, expanded thedesign to 32 bits, and "fixed" the segmentation, but required extra modes (suppressing the new features) forcompatibility, and retains the awkward architecture. In fact, with the right assembler, code written for the 8008 canstill be run on the most <span>recent </span>Intel 486.

The Intel 80386 added new op codes in a kludgy fashion similar to the Zilog Z80 and Zilog Z280. The Intel 486added full pipelines, and clock doubling (like <span>the </span>Zilog Z280).

So why did IBM chose the 8086 series when most of the alternatives were so much better? Apparently IBM's own engineers wanted to use the Motorola 68000, and it was used later in the forgotten IBM Instruments 9000 Laboratory Computer, but IBM already had rights to manufacture the 8086, in exchange for giving Intel the rights to its bubble memory<span> designs.</span> Apparently IBM was using 8086s in the IBM Displaywriter word processor.

Other factors were the 8-bit Intel 8088 version, which could use existing Intel 8085-type components, and allowed the computer to be based on a modified 8085 design. 68000 components were not widely available, though it could useMotorola 6800 components to an <span>extent.
</span>
Hope this helps
7 0
3 years ago
Read the scenarios below, then use the drop-down menus to decide if you should use a database.
Romashka [77]

Answer:

A. The parent-teacher orginization keeps a log of cookies sales to raise money for the elementary school.

Explanation:

5 0
3 years ago
What is a massive, room-sized computer that process and store enormous amounts of bulk data and information?
kipiarov [429]

Answer:

Mainframe Computer

Explanation:

The Mainframe Computers are designed for bulk data processing with high speed and storing huge data that can't be performed by other regular PCs. They can run multiple instances of operating systems at the same time. They are used for application such as accounting, business transaction, information retrieval, airlines for the seat reservation and engineering computation.

7 0
2 years ago
Describe the benefits of having an operational data warehouse (DWH), and the challenges of operating a DWH repository.
kvasek [131]

Answer:

The benefits of having the operational data ware-house are as follows:

  • The single operational warehouse typically support various tactical and the strategical decisions.  
  • It is subject oriented,volatile and integrated data warehousing in the system.
  • The warehousing mainly allow the system to process the large complex data in more efficient manner.
  • The operational warehouse are basically implemented for many business purposes.

The challenges of the operational warehouse repository are as follows:

  • In the operational data warehouse there is large number of user expectations.
  • The cost is the main challenge while designing the operational data warehousing as, it required efficient system in low cost.
  • Choosing the efficient and correct type of the warehouse is the big challenge.

5 0
3 years ago
The location of a radiotelephone sensor is ______________.
Sedaia [141]
The answer is being difficult to detect. A radiotelephone is a communication system for the transmission of the speech on a radio. It is rarely connected with the landline telephone service and other radio services like the GMRS. Hope this answer would help.
8 0
3 years ago
Other questions:
  • A bus topology network is most often deployed as a peer-to-peer network. <br> a. True <br> b. False
    7·1 answer
  • A motherboard has four DIMM slots; three slots are gray and the fourth is black. What type of memory is this board designed to u
    6·1 answer
  • What is the primary reason that organizations change their structure through downsizing, outsourcing, and offshoring as a means
    14·1 answer
  • Even though a high-level programming language
    11·1 answer
  • The main parts of a lever are the....
    6·2 answers
  • Carl wants to add a new slide to his PowerPoint presentation. Which option should he use?
    6·2 answers
  • What is trouble shoot​
    11·1 answer
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • Give an example of how loops are used in programming Kturtle​
    7·1 answer
  • If a computer uses 500 characters, how many bits this system requires to give different code to all characters?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!