List of questions
Related questions
Question 214 - PT0-002 discussion
A penetration tester is looking for vulnerabilities within a company's web application that are in scope. The penetration tester discovers a login page and enters the following string in a field:
1;SELECT Username, Password FROM Users;
Which of the following injection attacks is the penetration tester using?
A.
Blind SQL
B.
Boolean SQL
C.
Stacked queries
D.
Error-based
Your answer:
0 comments
Sorted by
Leave a comment first