ethical-hacker video for during a web server assessment, a penetration tester discovers an open directory listing that contains sensitive configuration files.
During a web server assessment, a penetration tester discovers an open directory listing that contains sensitive configuration files. What vulnerability is being exploited?