While performing an assessment on a web application, a penetration tester notices the web browser creates the following request when clicking on the stock status for an item:
POST /product/stock HTTP/1.0 -
Content-Type: application/x-www-form-urlencoded
Content-Length: 118 -
stockApi=http://stock.shop.com:8080/product/stock/check%3FproductId%3D6%26storeId%3D1
Which of the following types of attacks would the penetration tester most likely try NEXT?
041ba31
10 months, 4 weeks agoWANDOOCHOCO
1 year agoLiveLaughToasterBath
1 year agoGway
1 year, 2 months ago