Client Side attacks PEs Flashcards
_______________ is considered the most successful and sought out method to exploit a target.
Social Engineering
________________ is when an individual is manipulated to perform an action or reveal information that may compromise a target.
Social Engineering
_______________is a form of attack in which untrusted Javascript is injected into a trusted website.
Cross-Site Scripting
True/False Attackers are rarely successful with client side attacks because of the limited number of configuration variables as well as the low amount of user interaction.
False
____________ means that a user’s SQL input or data is checked for items that might harm the database.
Sanitized
What type of attack is initiated when the victim downloads content from the attacker.
Client Side
____________ checks inputs to ensure that it meets a criteria.
Validation
What is the target of an XSS:
Visitor’s browser
What are the two types of XSS?
Reflected and Stored
When the code of the targeted file is replaced with the infected code, this is known as:
Overwriting
What may store information pertaining to a session and track client’s other personal data?
Cookies
Viruses have a naming convention, established by Symantec, that involves alphanumeric characters, underscores, spaces. Each section is limited to how many characters?
20
True/False Social engineering occurs when a malicious actor leverages access to a user’s session cookies in order to impersonate that user.
false
Determine whether the XSS method presented is reflected or stored: When the injected script is reflected off the web server.
Reflected
____________ is the use of Valid SQL Queries via input data fields or attaching queries to the end of URLs from client side to server side application which could allow data to be read or modified.
SQL Injection