John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John’s network, which of the following options is he likely to choose?
A . Use ClosedVPN
B . Use Monkey shell
C . Use reverse shell using FTP protocol
D . Use HTTPTunnel or Stunnel on port 80 and 443
Answer: D
Explanation:
As long as you allow http or https traffic attacks can be tunneled over those protocols with Stunnel or HTTPTunnel.