A penetration tester successfully clones a source code repository and then runs the following command:
find . -type f -exec egrep -i "token|key|login" {} \;
Which of the following is the penetration tester conducting?
Penetration testers search for hardcoded credentials, API keys, and authentication tokens in source code repositories to identify secrets leakage.
Secrets scanning (Option B):
The find and egrep command scans all files recursively for sensitive keywords like 'token,' 'key,' and 'login'.
Attackers use tools like TruffleHog and GitLeaks to automate secret discovery.
Incorrect options:
Option A (Data tokenization): Tokenization replaces sensitive data with unique tokens, not scanning for credentials.
Option C (Password spraying): Tries common passwords across multiple accounts, unrelated to scanning source code.
Natalie
26 days agoCarissa
10 days agoTula
16 days agoPatrick
17 days agoFrancesco
27 days agoMollie
29 days agoLennie
29 days agoMonroe
1 months agoErasmo
6 days agoJonell
18 days agoCordell
19 days agoBlondell
1 months agoRenea
24 days agoGregoria
25 days agoCarin
27 days agoGlenna
2 months ago