A penetration tester successfully clones a source code repository and then runs the following command:
find . -type f -exec egrep -i "token|key|login" {} \;
Which of the following is the penetration tester conducting?
Penetration testers search for hardcoded credentials, API keys, and authentication tokens in source code repositories to identify secrets leakage.
Secrets scanning (Option B):
The find and egrep command scans all files recursively for sensitive keywords like 'token,' 'key,' and 'login'.
Attackers use tools like TruffleHog and GitLeaks to automate secret discovery.
Incorrect options:
Option A (Data tokenization): Tokenization replaces sensitive data with unique tokens, not scanning for credentials.
Option C (Password spraying): Tries common passwords across multiple accounts, unrelated to scanning source code.
Jeff
4 months agoAmie
4 months agoJina
4 months agoLajuana
4 months agoLindsey
4 months agoChun
5 months agoStephania
5 months agoAndree
5 months agoJudy
5 months agoOneida
5 months agoQuentin
5 months agoHyun
5 months agoHannah
5 months agoGolda
5 months agoPedro
5 months agoLeslie
5 months agoLenna
5 months agoKenda
6 months agoNatalie
12 months agoCarissa
11 months agoTula
11 months agoPatrick
11 months agoFrancesco
12 months agoMollie
12 months agoLennie
12 months agoMonroe
12 months agoErasmo
11 months agoJonell
12 months agoCordell
12 months agoBlondell
1 year agoRenea
12 months agoGregoria
12 months agoCarin
12 months agoGlenna
1 year ago