A penetration tester captured the following traffic during a web-application test:
Which of the following methods should the tester use to visualize the authorization information being transmitted?
Decode the authorization header using UTF-8.
Decrypt the authorization header using bcrypt.
Decode the authorization header using Base64.
Decrypt the authorization header using AES.
Submit