侵入テスト担当者が侵入テストを実施していて、クライアントが所有する Web サーバーの脆弱性を発見しました。この脆弱性を悪用すると、テスターはリバース シェルを開くことができます。権限昇格のためにサーバーを列挙すると、テスターは次のことを発見します。

ペネトレーションテスターが次に行うべきことは次のうちどれですか?
正解:C
Explanation
The image shows the output of the netstat -antu command, which displays active internet connections for the TCP and UDP protocols. The output shows that there are four established TCP connections and two listening UDP connections on the host. The established TCP connections have high numbered ports as their local addresses, such as 49152, 49153, 49154, and 49155. These ports are in the range of ephemeral ports, which are dynamically assigned by the operating system for temporary use by applications or processes. The foreign addresses of these connections are also high numbered ports, such as 4433, 4434, 4435, and 4436. These ports are not well-known or registered ports for any common service or protocol. The combination of high numbered ports for both local and foreign addresses suggests that these connections are suspicious and may indicate a backdoor or a covert channel on the host. Therefore, the penetration tester should investigate these connections next to determine their nature and purpose. The other options are not appropriate actions for the penetration tester at this stage.