Question 6

A penetration tester has gained access to a network device that has a previously unknown IP range on an interface. Further research determines this is an always-on VPN tunnel to a third-party supplier.
Which of the following is the BEST action for the penetration tester to take?
  • Question 7

    A penetration tester finds a PHP script used by a web application in an unprotected internal source code repository. After reviewing the code, the tester identifies the following:

    Which of the following tools will help the tester prepare an attack for this scenario?
  • Question 8

    A penetration tester who is doing a company-requested assessment would like to send traffic to another system using double tagging. Which of the following techniques would BEST accomplish this goal?
  • Question 9

    A penetration tester is testing a web application that is hosted by a public cloud provider. The tester is able to query the provider's metadata and get the credentials used by the instance to authenticate itself. Which of the following vulnerabilities has the tester exploited?
  • Question 10

    A penetration tester obtained the following results after scanning a web server using the dirb utility:
    ...
    GENERATED WORDS: 4612
    ---- Scanning URL: http://10.2.10.13/ ----
    + http://10.2.10.13/about (CODE:200|SIZE:1520)
    + http://10.2.10.13/home.html (CODE:200|SIZE:214)
    + http://10.2.10.13/index.html (CODE:200|SIZE:214)
    + http://10.2.10.13/info (CODE:200|SIZE:214)
    ...
    DOWNLOADED: 4612 - FOUND: 4
    Which of the following elements is MOST likely to contain useful information for the penetration tester?