List of questions
Related questions
Question 93 - PT0-002 discussion
A penetration tester would like to obtain FTP credentials by deploying a workstation as an on-path attack between the target and the server that has the FTP protocol. Which of the following methods would be the BEST to accomplish this objective?
A.
Wait for the next login and perform a downgrade attack on the server.
B.
Capture traffic using Wireshark.
C.
Perform a brute-force attack over the server.
D.
Use an FTP exploit against the server.
Your answer:
0 comments
Sorted by
Leave a comment first