Certified Ethical Hacker (CEH) Practice Question

During a web application penetration test against a cPanel-based shared hosting server, you have obtained limited shell access inside the home directory of one customer account. Apache is configured with the default FollowSymLinks option enabled and no additional symlink protection modules are loaded. You need to extract database credentials from another tenant's wp-config.php file without obtaining root privileges. Which technique is most likely to let you access the target file inside the shared environment?

  • Exploit host-header injection to make the virtual host for otheruser.com resolve to your document root.

  • Create a symbolic link inside your web root that points to /home/otheruser/public_html/wp-config.php, then access the symlinked file through the browser.

  • Perform a directory traversal attack using multiple ../ sequences to overwrite the target's .htaccess file.

  • Run an SQL injection against the mysql.user table to dump all stored passwords from the shared MySQL instance.

Certified Ethical Hacker (CEH)
Web Application Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot