A penetration tester obtains telnet access to a target machine using a captured credential. While trying to transfer her exploit to the target machine, the network intrusion prevention systems keeps detecting her exploit and terminating her connection. Which of the following actions will help the penetration tester transfer an exploit and compile it in the target system?
1) Use the telnet service's ECHO option to pull the file onto the target machine.
2) Use the copy ability and paste the file directly on the target machine.
3) Use the scp service, protocol SSHv2 to pull the file onto the target machine.
4) Use the http service's PUT command to push the file onto the target machine.
5) Use the ftp service in passive mode to push the file onto the target machine.