During a routine security inspection of the clients in your network, you find a program called
cgiscan.c on one of the computers. You investigate the file, reading part of the contents. Using the
portion of the program shown below, identify the function of the program.
<code>
Temp[1] = “GET /cgi-bin/phf HTTP/1.0\n\n”;
Temp[2] = “GET /cgi-bin/Count.cgi HTTP/1.0\n\n”;
Temp[3] = “GET /cgi-bin/test-cgi HTTP/1.0\n\n”;
Temp[4] = “GET /cgi-bin/php.cgi HTTP/1.0\n\n”;
Temp[5] = “GET /cgi-bin/handler HTTP/1.0\n\n”;
Temp[6] = “GET /cgi-bin/webgais HTTP/1.0\n\n”;
Temp[7] = “GET /cgi-bin/websendmail HTTP/1.0\n\n”;
</code>
A.
The program is designed to launch the users email program.
B.
The program is designed to manage the counters on a target web server.
C.
The program is simply old temp files, and nothing of interest.
D.
The program is designed to test the functionality of the cgi email scripts that are installed on the
server.
E.
The program is a vulnerability scanner