Which of the following types of attacks are MOST likely to be successful when using fuzzing against an executable program? (Select TWO).
A.
SQL injection
B.
Session hijacking
C.
Integer overflow
D.
Buffer overflow
E.
Header manipulation
Which of the following types of attacks are MOST likely to be successful when using fuzzing against an executable program? (Select TWO).
Which of the following types of attacks are MOST likely to be successful when using fuzzing against an executable program? (Select TWO).
A.
SQL injection
B.
Session hijacking
C.
Integer overflow
D.
Buffer overflow
E.
Header manipulation
Typically, fuzzers are used to test programs that take structured inputs