ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 331 - PT0-002 discussion

Report
Export

A penetration tester observes an application enforcing strict access controls. Which of the following would allow the tester to bypass these controls and successfully access the organization's sensitive files?

A.
Remote file inclusion
Answers
A.
Remote file inclusion
B.
Cross-site scripting
Answers
B.
Cross-site scripting
C.
SQL injection
Answers
C.
SQL injection
D.
Insecure direct object references
Answers
D.
Insecure direct object references
Suggested answer: D

Explanation:

Insecure Direct Object Reference (IDOR) vulnerabilities occur when an application provides direct access to objects based on user-supplied input. This can allow an attacker to bypass authorization and access resources in the system directly, for example database records or files1. In this case, the penetration tester could potentially bypass the strict access controls and access the organization's sensitive files.

Reference: IDOR Vulnerability Overview

asked 02/10/2024
Martin Schouten
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first