1.

What Is File Enumeration?

Answer»

This kind of attack uses the FORCEFUL browsing with the URL manipulation attack. Hackers can manipulate the PARAMETERS in url string and can GET the critical data which generally not open for PUBLIC such as achieved data, OLD version or data which in under development.

This kind of attack uses the forceful browsing with the URL manipulation attack. Hackers can manipulate the parameters in url string and can get the critical data which generally not open for public such as achieved data, old version or data which in under development.



Discussion

No Comment Found