Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-002 Topic 1 Question 40 Discussion

Actual exam question for CompTIA's PT0-002 exam
Question #: 40
Topic #: 1
[All PT0-002 Questions]

During an assessment, a penetration tester manages to exploit an LFI vulnerability and browse the web log for a target Apache server. Which of the following steps would the penetration tester most likely try NEXT to further exploit the web server? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Allene
16 days ago
Woah, hold on a second! Didn't they teach us about ethical hacking in this course? I better stick to the textbook answers like CSRF and SSRF. No need to go overboard with the evil stuff, am I right?
upvoted 0 times
...
Rene
29 days ago
Oh man, this is like a hacker's dream come true! I'm definitely going to try log poisoning and command injection. Imagine what kind of mayhem I could unleash on that poor Apache server!
upvoted 0 times
Lelia
7 hours ago
User 2: Yeah, and we can also try command injection to really wreak havoc on the server.
upvoted 0 times
...
Denise
1 days ago
User 1: Log poisoning sounds like a good idea. Let's mess with those logs.
upvoted 0 times
...
...
Nikita
1 months ago
I think SQL injection and cross-site scripting would be more interesting to explore. Who needs logs when you can manipulate the database or steal user sessions?
upvoted 0 times
...
Dorcas
1 months ago
Hmm, log poisoning and command injection seem like the logical next steps to further exploit the web server. Can't wait to try those out!
upvoted 0 times
...
Ilene
1 months ago
I would also consider trying command injection as the next step.
upvoted 0 times
...
Tamar
1 months ago
I agree with Deane, SQL injection could be a good option to further exploit the web server.
upvoted 0 times
...
Deane
1 months ago
I think the penetration tester might try SQL injection next.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77
a