File Inclusion Flashcards

1
Q

What is File Inclusion?

A

In some circumstances, web applications are written to request access to files via parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Parameter?

A

Parameters are query parameter strings attached to URLs to retrieve data or perform an action based on user input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Whats an example of parameters at work and where would one be implemented? Please write out a URL and explain:

A

http://webapp.thm/get.php?File=userCV.pdf

As you can see we have a full URL here with the parameter query string attached at the end. This is signified by use of the “?” followed by whatever the parameter is going to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Path Traversal?

A

Path Traversal also known as Directory Traversal, this vulnerability allows the attacker to read operating system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats an example of something that you’d be able access using Path Traversal and what do can you do to those files?

A

An example would be local fees running on a web application, you can then exploit these files by altering and messing with the file parameter of the URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Local File Inclusion?

A

Local File Inclusion works on he same principles as Path Traversal, however as the attacker you can use this to trick web application into running or exposing files on the web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s ../ do?

A

../ is a trick used for directory traversal (path traversal), the number of ../ is corresponding to the number of levels a path has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some common developer tricks that are used when trying to stop Local File Inclusions?

A

Sometimes when doing Local File Inclusion you’ll notice that a piece of code has actually been appended to your inclusion to purposely make it fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can this security measure be over taken?

A

The appended code trick can be overcome by using the NULL sign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are other security measures that developers use to try and stop File Inclusion?

A

Another security measure that could possible be implemented is when you use the ../ trick you may have to use an extra slash making it ..// to get over the security measure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Remote File Inclusion?

A

Remote File Inclusion is a technique used to include remote files into a vulnerable web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of these File Inclusions Is worse from a security perspective?

A

Remote File Inclusions are the more dangerous considering that these vulnerabilities are capable of giving the attacker remote access to the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the NULL sign actually do?

A

The NULL sign looks like this %00, and the sign ignores everything that comes after the NULL sign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly