Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 83 Topic 9 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 83 Topic 9 Discussion

312-50v13 Exam Topic 9 Question 83 Discussion:
Question #: 83
Topic #: 9

A penetration tester alters the "file" parameter in a web application (e.g., view?file=report.txt) to ../../../../etc/passwd and successfully accesses restricted system files. What attack method does this scenario illustrate?


A.

Conduct a brute-force attack to obtain administrative credentials


B.

Use directory traversal sequences in URL parameters to retrieve unauthorized system content


C.

Inject malicious scripts into web pages to manipulate content via XSS vulnerabilities


D.

Exploit buffer overflow issues by injecting oversized data in HTTP request headers


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.