ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 368 - PT0-002 discussion

Report
Export

A penetration tester is conducting an assessment of an organization that has both a web and mobile application. While testing the user profile page, the penetration tester notices that additional data is returned in the API response, which is not displayed in the web user interface. Which of the following is the most effective technique to extract sensitive user data?

A.
Compare PI I from data leaks to publicly exposed user profiles.
Answers
A.
Compare PI I from data leaks to publicly exposed user profiles.
B.
Target the user profile page with a denial-of-service attack.
Answers
B.
Target the user profile page with a denial-of-service attack.
C.
Target the user profile page with a reflected XSS attack.
Answers
C.
Target the user profile page with a reflected XSS attack.
D.
Compare the API response fields to GUI fields looking for PH.
Answers
D.
Compare the API response fields to GUI fields looking for PH.
Suggested answer: D

Explanation:

When additional data is returned in the API response that is not displayed in the web user interface, it indicates that there might be sensitive data being transmitted that is not intended for user display. By comparing the fields returned in the API response to those that are visible in the GUI, a penetration tester can identify any Personally Identifiable Information (PII) or other sensitive data that might be exposed unintentionally. This method is direct and does not involve attacking the system but rather analyzing the data being transmitted. The other options do not directly address the identification of sensitive data in API responses.

asked 02/10/2024
Grégory CALIX
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first