a. Misconfiguration in OS |
b. Using network vulnerabilities |
c. Misconfiguration in networks |
d. Bugs in OS which allow commands to run on web servers |
Answer: Using network vulnerabilities |
a. Misconfiguration in OS |
b. Using network vulnerabilities |
c. Misconfiguration in networks |
d. Bugs in OS which allow commands to run on web servers |
Answer: Using network vulnerabilities |