A penetration tester successfully clones a source code repository and then runs the following command:
find . -type f -exec egrep -i "token|key|login" {} \;
Which of the following is the penetration tester conducting?
Penetration testers search for hardcoded credentials, API keys, and authentication tokens in source code repositories to identify secrets leakage.
Secrets scanning (Option B):
The find and egrep command scans all files recursively for sensitive keywords like 'token,' 'key,' and 'login'.
Attackers use tools like TruffleHog and GitLeaks to automate secret discovery.
Incorrect options:
Option A (Data tokenization): Tokenization replaces sensitive data with unique tokens, not scanning for credentials.
Option C (Password spraying): Tries common passwords across multiple accounts, unrelated to scanning source code.
Natalie
18 days agoCarissa
2 days agoTula
8 days agoPatrick
9 days agoFrancesco
19 days agoMollie
21 days agoLennie
21 days agoMonroe
24 days agoJonell
10 days agoCordell
11 days agoBlondell
28 days agoRenea
16 days agoGregoria
17 days agoCarin
19 days agoGlenna
1 months ago