A penetration tester obtains telnet access to a target machine using a captured credential. While trying to transfer her exploit to the target machine, the network intrusion detection systems keeps detecting her exploit and terminating her connection. Which of the following actions will help the penetration tester transfer an exploit and compile it in the target system?
A. se the http service's PUT command to push the file onto the target machine
B. se the scp service, protocol SSHv2 to pull the file onto the target machine
C. se the telnet service's ECHO option to pull the file onto the target machine
D. se the ftp service in passive mode to push the file onto the target machine