During an assessment, a penetration tester manages to exploit an LFI vulnerability and browse the web log for a target Apache server. Which of the following steps would the penetration tester most likely try NEXT to further exploit the web server? (Choose two.)
Etc_Shadow28000
10 months, 2 weeks agodeeden
1 year, 2 months agoLiveLaughToasterBath
1 year, 3 months agoLiveLaughToasterBath
1 year, 3 months agoDanJia
1 year, 5 months agoDanJia
1 year, 5 months agoDRVision
1 year, 6 months agosolutionz
1 year, 9 months agomatheusfmartins
1 year, 9 months agoRAMI_PAL
2 years agoRAMI_PAL
2 years agoRAMI_PAL
2 years agoRAMI_PAL
2 years agomatheusfmartins
1 year, 9 months ago[Removed]
2 years, 1 month ago[Removed]
2 years, 1 month agoKingIT_ENG
2 years, 2 months ago[Removed]
2 years, 2 months agonickwen007
2 years, 2 months agonickwen007
2 years, 2 months agocy_analyst
2 years, 2 months ago[Removed]
2 years, 2 months ago[Removed]
2 years, 2 months ago[Removed]
2 years, 2 months ago