List of questions
Related questions
Question 20 - PT0-003 discussion
In a file stored in an unprotected source code repository, a penetration tester discovers the following line of code:
<a target='_blank' href='mailto:[email protected]'>sshpass -p donotchange ssh [email protected]</a>
Which of the following should the tester attempt to do next to take advantage of this information? (Select two).
A.
Use Nmap to identify all the SSH systems active on the network.
B.
Take a screen capture of the source code repository for documentation purposes.
C.
Investigate to find whether other files containing embedded passwords are in the code repository.
D.
Confirm whether the server 192.168.6.14 is up by sending ICMP probes.
E.
Run a password-spraying attack with Hydra against all the SSH servers.
F.
Use an external exploit through Metasploit to compromise host 192.168.6.14.
Your answer:
0 comments
Sorted by
Leave a comment first