List of questions
Related questions
Question 30 - PT0-003 discussion
During an assessment, a penetration tester exploits an SQLi vulnerability. Which of the following commands would allow the penetration tester to enumerate password hashes?
A.
sqlmap -u www.example.com/?id=1 --search -T user
B.
sqlmap -u www.example.com/?id=1 --dump -D accounts -T users -C cred
C.
sqlmap -u www.example.com/?id=1 --tables -D accounts
D.
sqlmap -u www.example.com/?id=1 --schema --current-user --current-db
Your answer:
0 comments
Sorted by
Leave a comment first