A penetration test is being scoped for a set of web services with API endpoints.
The APIs will be hosted on existing web application servers.
Some of the new APIs will be available to unauthenticated users, but some will only be available to authenticated users.
Which of the following tools or activities would the penetration tester MOST likely use or do during the engagement? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E. F.BC.
The penetration tester is tasked with evaluating the security of a set of web services with API endpoints, some of which are available to unauthenticated users and some of which are only available to authenticated users. The tester will need to identify potential vulnerabilities that could be exploited by attackers and provide recommendations for remediation.
Based on this scenario, the two tools or activities that the penetration tester is MOST likely to use or do during the engagement are:
Intercepting proxy: An intercepting proxy is a tool that allows the tester to intercept and analyze traffic between the web services and the clients. This can help the tester identify vulnerabilities such as insufficient authentication or authorization controls, injection attacks, and other vulnerabilities that could be exploited by attackers. By intercepting and modifying requests and responses, the tester can also test for input validation and output encoding issues.
Reconnaissance gathering: Reconnaissance gathering is the process of gathering information about the target environment and identifying potential vulnerabilities. This can involve using tools such as port scanners to identify open ports and services, analyzing the web application servers to identify potential vulnerabilities in the software, and analyzing the API endpoints to identify potential weaknesses. The tester may also use social engineering techniques to gather information about the target environment, such as phishing emails or phone calls.
While the other tools and activities listed in the answer choices may be useful in other scenarios, they are not the most likely to be used in this particular scenario.
For example: