A penetration tester successfully exploits a DM2 server that appears to be listening on an outbound port. The penetration tester wishes to forward that traffic back to a device.
Which of the following are the BEST tools to use few this purpose? (Select TWO)
A . Tcpdump
B . Nmap
C . Wiresrtark
D . SSH
E . Netcat
F . Cain and Abel
Answer: B,D