Appendix H Flashcards

1
Q

What can be found within HTML source code that may be beneficial to an attacker

A
Hidden Form Fields
Database Connection Strings
Credentials
Developer Comments
Other included files
Authenticated only URLs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Nmap script can be used to discover supported methods on a Web site

A

nmap –script=http-methods.nse ipaddress -n -p 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Metasploit plugin can be used to discover supported methods on a Web site

A

auxilary/scanner/http/options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can be used to identify Verb tampering

A

Nmap script for verb tampering:
nmap –script=http-method-tamper.nse

msfplugin for verb tampering:
auxilary/scanner/http/verb_auth_bypass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does Basic authentication send data

A

In plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does Digest authentication work

A

It sends a hash of the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a common misconfiguration with the Apache .htaccess file

A

An application configured with basic security which limits to a specific HTTP request may be susceptible to Verb tampering. Meaning that by simply using a different request i.e. using GET instead of POST, it would be possible to access otherwise restricted forms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the best practice of input validation

A

Web applications should perform input validation checking of all client provided variables, to strip dangerous characters used in many attacks (SQLi / XSS) such as ‘;–| and directives, HTML tags, and JavaScript strings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four strategies for validating data

A

Accept Known Good - “Whitelist” or “positive”

Checks that data is one of the known good values in list.
Any data that doesn’t match is rejected.

Accept Known Bad - “Blacklist” or “negative”

Blocks unexpected characters, strings or JavaScript which are known in list.
Requires an up to date list of negative characters.

Sanitise with Whitelist

Changes user input into an acceptable form.
Any character which aren’t part of approved list are removed, encoded or replaced.

Sanitise with Blacklist

Sanitises unexpected characters, strings or JavaScript which are known in list.
Requires an up to date list of negative characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three types of XSS

A

Stored, Reflected, DOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is stored XSS

A

Injected code is stored permanently on the server and executed every time the page is visited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is reflected XSS

A

When the XSS is not stored on the site, need to send the XSS parameters each time you visit the page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is DOM XSS

A

When the payload is executed as a result of modifying the DOM environment in the browser used by the original client side script.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the potential implications of SQLi

A

Recovery of data, command execution and compromising data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What would the following SQL injection do?

a’ UNION SELECT null,load_file(‘/etc/passwd’) #

A

Output the contents of /etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The following injection fails, what is the likely cause?

a’ OR 1=1–

A

The page says error is near “ ‘ “, more than likely the ‘–’ comment isn’t working, replace ‘–’ with ‘#’