Question: 57
Which of the following mitigation techniques, best limits th...
A financial application on a Linux server performs an integrity check on its configuration file (/etc/finance/config.cfg
) before loading it to ensure it has not been tampered with. The integrity check involves verifying the file's checksum. Shortly after the check, the application reads and executes the configuration file. An attacker wants to exploit this behavior to execute malicious code by manipulating the configuration file. Which of the following attack methods is the attacker most likely to use?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! ๐
No comments yet. Be the first to comment!