Quizzes.technology

๐Ÿ›ก๏ธ Free practice test question from: TOCTOUC vulnerability (Security+)

Challenging Question
TOCTOUC vulnerabilitysymlink attackattack vector

A financial application on a Linux server performs an integrity check on its configuration file (/etc/finance/config.cfg) before loading it to ensure it has not been tampered with. The integrity check involves verifying the file's checksum. Shortly after the check, the application reads and executes the configuration file. An attacker wants to exploit this behavior to execute malicious code by manipulating the configuration file. Which of the following attack methods is the attacker most likely to use?

๐Ÿ’ฌ Discussion and Feedback

Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! ๐Ÿ™

Comments

No comments yet. Be the first to comment!