Q: 9
Which of the following attacks allows an attacker to access restricted directories, including
application source code, configuration and critical system files, and to execute commands outside of
the web server’s root directory?
Options
Discussion
That's directory traversal, so option C. This attack exploits path input to reach sensitive files beyond the web server root. I've seen similar questions in practice exams and it's always pointing to directory traversal for this scenario. Pretty sure about it but correct me if you see something I missed.
Don't think it's D like some say, that's a trap here. C fits since directory traversal is what actually gives access outside the web root.
C . Directory traversal is the one that lets an attacker jump outside the web server's root and access system files using path tricks like ../. The others don't really match that scenario, right?
D tbh
C imo, directory traversal is exactly for escaping the web root and grabbing sensitive files. The other options don't really let attackers go outside the intended folder structure. Pretty confident but open to other takes.
Call it C, I've seen similar on official practice and directory traversal is usually the right pick for accessing files outside webroot.
C for me. Directory traversal is the only one here that lets someone escape the web root and reach sensitive files by tampering with path inputs. Unvalidated input can lead to this, but directory traversal is the direct attack. Pretty sure that's what they're after, agree?
C not D. Security misconfig can be a trap here but directory traversal specifically lets attackers move outside the web root.
Yeah C fits. Directory traversal lets attackers break out of the web root and grab files they shouldn't access, like configs or source code. The others don't really allow for that kind of direct file system access. Pretty confident about this one but open to corrections if anyone disagrees.
C, that's directory traversal for sure
Be respectful. No spam.