List of questions
Related questions
Question 523 - 312-50v12 discussion
An ethical hacker is testing a web application of a financial firm. During the test, a 'Contact Us' form's input field is found to lack proper user input validation, indicating a potential Cross-Site Scripting (XSS) vulnerability. However, the application has a stringent Content Security Policy (CSP) disallowing inline scripts and scripts from external domains but permitting scripts from its own domain. What would be the hacker's next step to confirm the XSS vulnerability?
A.
Try to disable the CSP to bypass script restrictions
B.
Inject a benign script inline to the form to see if it executes
C.
Utilize a script hosted on the application's domain to test the form
D.
Load a script from an external domain to test the vulnerability
Your answer:
0 comments
Sorted by
Leave a comment first