Last Updated on August 14, 2021 by Admin
A penetration tester harvests potential usernames from a social networking site. The penetration tester then uses social engineering to attempt to obtain associated passwords to gain unauthorized access to shares on a network server.
Which of the following methods is the penetration tester MOST likely using?
- Escalation of privilege
- SQL injection
- Active reconnaissance
- Proxy server