Which of the following combinations of tools would the penetration tester use to exploit this script?
A penetration tester finds a PHP script used by a web application in an unprotected internal source code repository.
After reviewing the code, the tester identifies the following: 
![]()
Which of the following combinations of tools would the penetration tester use to exploit this script?
A . Hydra and crunch
B. Netcat and cURL
C. Burp Suite and DIRB
D. Nmap and OWASP ZAP
Answer: B
Latest PT0-002 Dumps Valid Version with 110 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments