List of questions
Related questions
Question 381 - 312-50v12 discussion
What is the most common method to exploit the "Bash Bug" or "Shellshock" vulnerability?
A.
SYN Flood
B.
SSH
C.
Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server
D.
Manipulate format strings in text fields
Your answer:
0 comments
Sorted by
Leave a comment first