Which of the following types of attacks are MOST likely…

Which of the following types of attacks are MOST likely to be successful when using fuzzing against an executable program? (Select TWO).

Which of the following types of attacks are MOST likely to be successful when using fuzzing against an executable program? (Select TWO).

A.
SQL injection

B.
Session hijacking

C.
Integer overflow

D.
Buffer overflow

E.
Header manipulation



Leave a Reply 1

Your email address will not be published. Required fields are marked *

ten − two =


DaveyBoy

DaveyBoy

Typically, fuzzers are used to test programs that take structured inputs