During an assessment, a penetration tester manages to exploit an LFI vulnerability and browse the web log for a target Apache server. Which of the following steps would the penetration tester most likely try NEXT to further exploit the web server? (Choose two.)
Etc_Shadow28000
1 year agodeeden
1 year, 3 months agoLiveLaughToasterBath
1 year, 5 months agoLiveLaughToasterBath
1 year, 5 months agoDanJia
1 year, 7 months agoDanJia
1 year, 7 months agoDRVision
1 year, 7 months agosolutionz
1 year, 11 months agomatheusfmartins
1 year, 11 months agoRAMI_PAL
2 years, 1 month agoRAMI_PAL
2 years, 1 month agoRAMI_PAL
2 years, 1 month agoRAMI_PAL
2 years, 1 month agomatheusfmartins
1 year, 11 months ago[Removed]
2 years, 2 months ago[Removed]
2 years, 2 months agoKingIT_ENG
2 years, 3 months ago[Removed]
2 years, 3 months agonickwen007
2 years, 4 months agonickwen007
2 years, 4 months agocy_analyst
2 years, 4 months ago[Removed]
2 years, 4 months ago[Removed]
2 years, 4 months agokloug
2 years, 4 months ago