A security engineer successfully exploits an application during a penetration test.
As proof of the exploit, the security engineer takes screenshots of how data was compromised in the application.
Given the information below from the screenshot.
Which of the following tools was MOST likely used to exploit the application?
Click on the arrows to vote for the correct answer
A. B. C. D.B.