Which of the following methods is the penetration tester MOST likely using?

Last Updated on August 14, 2021 by Admin

A penetration tester harvests potential usernames from a social networking site. The penetration tester then uses social engineering to attempt to obtain associated passwords to gain unauthorized access to shares on a network server.

Which of the following methods is the penetration tester MOST likely using?

  • Escalation of privilege
  • SQL injection
  • Active reconnaissance
  • Proxy server