Question

A security engineer successfully exploits an application during a penetration test. As proof of the exploit, the security engineer takes screenshots of how data was compromised in the application. Given the information below from the screenshot.

2019-11-21 13:11:45 POST https://company.com/store <-- 200 text/plain 2.02 kB 0.99 .Request... ..**Response** ..... Detail...

Which of the following tools was MOST likely used to exploit the application?

A. The engineer captured the data with a protocol analyzer, and then utilized Python to edit the data

B. The engineer queried the server and edited the data using an HTTP proxy interceptor

C. The engineer used a cross-site script sent via curl to edit the data

D. The engineer captured the HTTP headers, and then replaced the JSON data with a banner-grabbing tool

PLEASE EXPLAIN THE CORRECT ANSWER OPTION CHOICE AND REASONING ALONG WITH REASONING WHY OTHER OPTIONS ARE NOT CORRECT FOR A THUMBS UP, THANKS...

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Solution

Answer

B. The engineer queried the server and edited the data using an HTTP proxy interceptor

Explanation

HTTP proxy interceptor is a network tool that is used to analyze the traffic and edit or modify the traffic and in some situation inject traffic into the normal session created between a client & server

Hence the option B is the correct answer

---

all the best

Add a comment
Know the answer?
Add Answer to:
A security engineer successfully exploits an application during a penetration test. As proof of the exploit,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • A developer emails the following output to a security administrator for review Cookie serbadguy path; tponly...

    A developer emails the following output to a security administrator for review Cookie serbadguy path; tponly Which of the following tools might the security administrator use to perform further security assessment of this issue? Port Scanner Vulnerability scanner HTTP Interceptor A securnynoncer successfully explots an application during a penetration test As proof of the exploit the security engineer takes screenshots of how data was compromised in the application Given the information below from the screenshot 2013-11-21 13:11 5 root https://company.com/store...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT