A security engineer successfully exploits an application during a penetration test. As proof of the exploit, the security engineer takes screenshots of how data was compromised in the application. Given the information below from the screenshot.
Which of the following tools was MOST likely used to exploit the application?
A. The engineer captured the data with a protocol analyzer, and then utilized Python to edit the data
B. The engineer queried the server and edited the data using an HTTP proxy interceptor
C. The engineer used a cross-site script sent via curl to edit the data
D. The engineer captured the HTTP headers, and then replaced the JSON data with a banner-grabbing tool
PLEASE EXPLAIN THE CORRECT ANSWER OPTION CHOICE AND REASONING ALONG WITH REASONING WHY OTHER OPTIONS ARE NOT CORRECT FOR A THUMBS UP, THANKS...
Solution
Answer
B. The engineer queried the server and edited the data using an HTTP proxy interceptor
Explanation
HTTP proxy interceptor is a network tool that is used to analyze the traffic and edit or modify the traffic and in some situation inject traffic into the normal session created between a client & server
Hence the option B is the correct answer
---
all the best
A security engineer successfully exploits an application during a penetration test. As proof of the exploit,...
A developer emails the following output to a security administrator for review Cookie serbadguy path; tponly Which of the following tools might the security administrator use to perform further security assessment of this issue? Port Scanner Vulnerability scanner HTTP Interceptor A securnynoncer successfully explots an application during a penetration test As proof of the exploit the security engineer takes screenshots of how data was compromised in the application Given the information below from the screenshot 2013-11-21 13:11 5 root https://company.com/store...
CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...