Certified Ethical Hacker (CEH) Practice Question

During an external penetration test you send an HTTP OPTIONS request to a company's IIS 10 web server. The header shows: Allow: GET, HEAD, OPTIONS, PUT, DELETE, PROPFIND, MKCOL. Further tests confirm WebDAV is enabled and no authentication protects these verbs. According to standard web-server attack workflow, which exploitation step should you try next?

  • Upload a malicious .aspx web shell through the WebDAV PUT method and invoke it to gain code execution on the server.

  • Exploit the Shellshock Bash vulnerability in any CGI scripts hosted on the server.

  • Attempt SQL injection against the user authentication form on the site's homepage.

  • Request an AXFR transfer from the organization's name server to enumerate internal DNS records.

Certified Ethical Hacker (CEH)
Web Application Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot