ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 176 - PT0-002 discussion

Report
Export

A penetration tester finds a PHP script used by a web application in an unprotected internal source code repository. After reviewing the code, the tester identifies the following:

Which of the following combinations of tools would the penetration tester use to exploit this script?

A.
Hydra and crunch
Answers
A.
Hydra and crunch
B.
Netcat and cURL
Answers
B.
Netcat and cURL
C.
Burp Suite and DIRB
Answers
C.
Burp Suite and DIRB
D.
Nmap and OWASP ZAP
Answers
D.
Nmap and OWASP ZAP
Suggested answer: B
asked 02/10/2024
Paul Hackett
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first