Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following Google Dorks can be used for finding directory listing on victim-app.com?

A.

intitle:"Index of" site:victim-app.com

B.

intext:"Index of" site:victim-app.com

C.

Both A and B

D.

None of the above

In the screenshot below, an attacker is attempting to exploit which vulnerability?

Request

POST /dashboard/userdata HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=7576572ce167b5634ie646de967c759643d53031

Te: trailers

Connection: keep-alive

Content-Type: application/x-www-form-urlencoded

Content-Length: 36

useragent=http://127.0.0.1/admin

PrettyRaw | Hex | php | curl | ln | Pretty

HTTP/1.1 200 OK

Date: Fri, 09 Dec 2022 11:42:27 GMT

Content-Type: text/html; charset=UTF-8

Content-Length: 12746

Connection: keep-alive

X-Xss-Protection: 1; mode=block

X-Content-Type-Options: nosniff

X-Request-ID: 65403d71e8745d5e1fe205f44d531

Content-Length: 12746

</p><p>Admin Panel</p><p>

A.

HTTP Desync Attack

B.

File Path Traversal Attack

C.

Open URL Redirection

D.

Server-Side Request Forgery

What is the full form of SAML?

A.

Security Assertion Markup Language

B.

Security Authorization Markup Language

C.

Security Assertion Management Language

D.

Secure Authentication Markup Language

Scan the code below and identify the vulnerability which is the most applicable for this scenario.

A.

SQL Injection

B.

Type Juggling

C.

Component with a Known Vulnerability

D.

Server-Side Request Forgery