SHA MD5 RSA RC5 admin See author's posts Post navigation You are performing a penetration test. You achieved access via a buffer overflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator’s bank account password and login information for the administrator’s bitcoin account. What should you do? Which utility will tell you in real time which ports are listening or in another state?