Question 345:
A penetration tester harvests potential usernames from a social networking site. The penetration tester then uses social engineering to attempt to obtain associated passwords to gain unauthorized access to shares on a network server. Which of the following methods is the penetration tester MOST likely using?
Answer options:
A. Escalation of privilege B. SQL injection C. Active reconnaissance D. Proxy server