Module 13 - Hacking Web Servers Flashcards
___ ______ is a computer system that stores, processes and delivers web pages to clients via HTTP.
a. DNS Server
b. Web Server
c. Exchange Server
d. SCCM Server
b. Web Server
Web Server Concepts:
Internet Information Services (IIS) is used on which system?
a. Linux
b. Unix
c. Solaris
d. Microsoft
d. Microsoft
Web Server Concepts:
Apache web services are used on which system?
a. Linux
b. Unix
c. Solaris
d. Microsoft
a. Linux
Web Server Attacks:
- Attacker uses compromised PCs with spoofed IP address to amplify the DDoS attacks on victims’ DNS server by exploiting DNS recursive method.
-
2 or more computers attack a DNS server
a. DNS Attack
b. Directory Traversal Attack
c. DNS Amplification Attack
d. Man-in-the-Middle Attack (MITM)
c. DNS Amplification Attack
Web Server Attacks:
Attackers gain access to restricted directories outside of the web server root directory.
a. DNS Attack
b. Directory Traversal Attack
c. DNS Amplification Attack
d. Man-in-the-Middle Attack (MITM)
b. Directory Traversal Attack
Web Server Attacks:
- Allows an attacker to access sensitive information by intercepting and altering communications between an end-user and server.
- Can lead to a Replay Attack.
a. DNS Attack
b. Directory Traversal Attack
c. DNS Amplification Attack
d. Man-in-the-Middle Attack (MITM)
d. Man-in-the-Middle Attack
Web Server Attack Methodology:
Implement _____________ ____ scan to identify weaknesses in a network and determine if the system can be exploited.
a. Banner Grab
b. Exploit Scan
c. Service Scan
d. Vulnerability Scan
d. Vulnerability Scan
Web Server Attack Tools:
________ is an exploit tool which supports fully automated exploitation of web servers, by abusing known vulnerabilities and leveraging weak passwords via Telnet, SSH, HTTP, and SNMP.
a. Metasploit
b. Nessus
c. IntelLink
d. Lexus Nexus
a. Metasploit
Patch Management:
A ________ adds functionality to a system.
a. Service Pack
b. Patch
c. Exploit
d. Hotfix
b. Patch
Patch Management:
A _________ is a combination of 100+ hotfixes and patches for a system.
a. Service Pack
b. Patch
c. Exploit
d. Hotfix
a. Service Pack
Patch Management:
A ________ fixes things or something on a system.
a. Service Pack
b. Patch
c. Exploit
d. Hotfix
d. Hotfix
Method that compare binary signatures of know attacks to dettect misuse and a intrusion.
Signature Recognition
Dettect a intrusion when an event occurs outside the baseline off normal traffic. Based on bahavioral.
Anormaly detection