While performing an assessment on a web application, a penetration tester notices the web browser creates the following request when clicking on the stock status for an item:
POST /product/stock HTTP/1.0 -
Content-Type: application/x-www-form-urlencoded
Content-Length: 118 -
stockApi=http://stock.shop.com:8080/product/stock/check%3FproductId%3D6%26storeId%3D1
Which of the following types of attacks would the penetration tester most likely try NEXT?
041ba31
8 months agoWANDOOCHOCO
9 months, 1 week agoLiveLaughToasterBath
9 months, 2 weeks agoGway
12 months ago