A penetration tester would like to obtain FTP credentials by deploying a workstation as an on-path attack between the target and the server that has the FTP protocol. Which of the following methods would be the BEST to accomplish this objective?
Penetration-testing activities have concluded, and the initial findings have been reviewed with the client. Which of the following best describes the NEXT step in the engagement?
Which of the following is the MOST effective person to validate results from a penetration test?
A penetration tester runs the unshadow command on a machine. Which of the following tools will the tester most likely use NEXT?