A penetration tester successfully clones a source code repository and then runs the following command:
find . -type f -exec egrep -i "token|key|login" {} \;
Which of the following is the penetration tester conducting?
Penetration testers search for hardcoded credentials, API keys, and authentication tokens in source code repositories to identify secrets leakage.
Secrets scanning (Option B):
The find and egrep command scans all files recursively for sensitive keywords like 'token,' 'key,' and 'login'.
Attackers use tools like TruffleHog and GitLeaks to automate secret discovery.
Incorrect options:
Option A (Data tokenization): Tokenization replaces sensitive data with unique tokens, not scanning for credentials.
Option C (Password spraying): Tries common passwords across multiple accounts, unrelated to scanning source code.
Natalie
2 months agoCarissa
2 months agoTula
2 months agoPatrick
2 months agoFrancesco
2 months agoMollie
2 months agoLennie
2 months agoMonroe
2 months agoErasmo
1 months agoJonell
2 months agoCordell
2 months agoBlondell
2 months agoRenea
2 months agoGregoria
2 months agoCarin
2 months agoGlenna
3 months ago