subject

An internal penetration tester finds a legacy application that takes measurement input made in a text box and outputs a specific string of text related to industry requirements. There is no documentation about how this application works, and the source code has been on Which of the following would BEST allow the penetration tester to determine the input and output relationship? a. Running an automated fuzzer
b. Constructing a known cipher text attack
c. Attempting SQL injection commands
d. Performing all packet capture
e. Using the application in a malware sandbox

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 10:40
When running anti-virus software , what could be a reason where recipitent is not guaranteed that data being streamed will not get interrupted?
Answers: 1
question
Computers and Technology, 23.06.2019 21:50
Description: write function lastfirst() that takes one argument—a list of strings of the format "lastname, firstname" —and returns a list consisting of two lists: (a) a list of all the last names (b) a list of all the first names
Answers: 2
question
Computers and Technology, 24.06.2019 06:30
Some peer-to-peer networks have a server and some don't. true false
Answers: 2
question
Computers and Technology, 24.06.2019 15:30
What is not a type of text format that will automatically be converted by outlook into a hyperlink?
Answers: 1
You know the right answer?
An internal penetration tester finds a legacy application that takes measurement input made in a tex...
Questions
question
Computers and Technology, 19.11.2020 21:20
question
Business, 19.11.2020 21:20
question
Chemistry, 19.11.2020 21:20
question
Mathematics, 19.11.2020 21:20
Questions on the website: 13722359