Because of an insecure code practice, an attacker can leverage and completely compromise an application or the underlying system. What insecure code practice enabled this catastrophic threat?
- lack of error handling
- use of hard-coded credentials
- overly verbose error handling
- comments that contain too much information
Explanation: Hard-coded credentials are catastrophic flaws that attackers can leverage to completely compromise an application or the underlying system.
Exam with this question: 6.13.3 Quiz - Performing Post-Exploitation Techniques Answers
Please login or Register to submit your answer