Posted by: Pdfprep
Post Date: December 18, 2020
A CMS plugin creates two files that are accessible from the Internet myplugin.html and exploitable.php. A newly discovered exploit takes advantage of an injection vulnerability in exploitable.php. To exploit the vulnerability, one must send an HTTP POST with specific variables to exploitable.php. You see traffic to your webserver that consists of only HTTP GET requests to myplugin.html.
Which category best describes this activity?
A . weaponization
B . exploitation
C . installation
D . reconnaissance
Answer: D
Leave a Reply