Module 14 - Hacking Web Application ( EC Mode Part 01 ) Flashcards
Which of the following attacks can take place due to flaws such as insecure cryptographic storage and information leakage?
A. SQL injection
B. Command injection
C. Sensitive data exposure
D. Shell injection
Answer: C. Sensitive data exposure
Which of the following attacks exploits vulnerabilities in dynamically generated webpages, which enables malicious attackers to inject client-side scripts into webpages viewed by other users?
A. Broken access control
B. Security misconfiguration
C. Cross-site scripting
D. Sensitive data exposure
Answer: C. Cross-site scripting
A security analyst in an insurance company is assigned to test a new web application that will be used by clients to help them choose and apply for an insurance plan. The analyst discovers that the application has been developed in ASP scripting language and it uses MSSQL as a database backend. The analyst locates the application’s search form and introduces the following code in the search input field: IMG SRC=vbscript:msgbox(“Vulnerable”);> originalAttribute=”SRC” originalPath=”vbscript:msgbox(“Vulnerable”);>”
When the analyst submits the form, the browser returns a pop-up window that says “Vulnerable.”
Which web applications vulnerability did the analyst discover?
A. SQL injection
B. Command injection
C. Cross-site scripting
D. Cross-site request forgery
Answer: C. Cross-site scripting
An attacker has been successfully modifying the purchase price of items purchased on the company’s website. The security administrators verify the webserver and Oracle database have not been compromised directly. They have also verified the intrusion detection system (IDS) logs and found no attacks that could have caused this. What is the most likely way the attacker has been able to modify the purchase price?
A. By using cross site scripting
B. By changing hidden form values
C. By using SQL injection
D. By utilizing a buffer overflow attack
Answer: B. By changing hidden form values
An attacker identifies the kind of websites a target company/individual is frequently surfing and tests those particular websites to identify any possible vulnerabilities. When the attacker identifies the vulnerabilities in the website, the attacker injects malicious script/code into the web application that can redirect the webpage and download the malware onto the victim’s machine. After infecting the vulnerable web application, the attacker waits for the victim to access the infected web application. What kind of an attack is this?
A. Phishing attack
B. Water hole attack
C. Denial-of-service attack
D. Jamming attack
Answer: B. Water hole attack
Which of the following application security risks occurs as a result of failure in the implementation of proper key management systems or using old keys for protecting the sensitive data of an organization?
A. Cryptographic failures
B. Injection
C. Security misconfiguration
D. Software and data integrity failures
Answer: A. Cryptographic failures
Which of the following application security risks can be evolved as a result of downloading updates from unauthorized or previously trusted sources without conducting sufficient security checks?
A. Vulnerable and outdated components
B. Identification and authentication failures
C. Security logging and monitoring failures
D. Software and data integrity failures
Answer: D. Software and data integrity failures
Identify the application security risk that can arise because of inappropriate alert mechanisms for failed-login attempts, or the application cannot identify threats in advance, which may result in leakage of sensitive information.?
A. Vulnerable and outdated components
B. Security logging and monitoring failures
C. Server-side request forgery
D. Injection
Answer: B. Security logging and monitoring failures
Which of the following is a web security vulnerability that arises when remote resources are obtained by an application without verifying the URL entered by the user and are exploited by the attackers to read or modify internal resources and steal sensitive information?
A. Identification and authentication failures
B. Server-side request forgery
C. Software and data integrity failures
D. Insecure design
Answer: B. Server-side request forgery
Which of the following is a vulnerability that allows attackers to add their parameters to a URL to redirect users from trusted websites to malicious sites where they can steal sensitive user data and redirect users back to the original website?
A. Direct timing attack
B. Banner grabbing
C. Header-based open redirection
D. Open redirection
Answer: D. Open redirection
Which of the following involves the process of modifying the HTTP location header to redirect users to a malicious page without their knowledge?
A. LDAP injection
B. HTML injection
C. Header-based open redirection
D. Directory traversal
Answer: C. Header-based open redirection
Which of the following attacks is also known as a related-domain attack, which occurs when an attacker targets a subdomain of a trusted organization and attempts to redirect users to an attacker-controlled web page?
A. Direct timing attack
B. DoS attack
C. Same-site attack
D. SQL injection attack
Answer: C. Same-site attack
Which of the following attacks occurs when attackers obtain a clone of a cookie from the user’s browser and use it to establish a session with the target web server and further allow attackers to access a user’s web services without providing any identity?
A. DNS rebinding attack
B. Pass-the-cookie attack
C. SSRF attack
D. Connection string parameter pollution
Answer: B. Pass-the-cookie attack
In which of the following types of injection attacks does an attacker exploit vulnerable form inputs, inject HTML code into a webpage, and change the website appearance?
A. HTML injection
B. HTML embedding
C. Shell injection
D. File injection
Answer: A. HTML injection
Which of the following attacks allows an attacker to encode portions of the attack with Unicode, UTF-8, Base64, or URL encoding to hide their attacks and avoid detection?
A. Obfuscation application
B. Network access attack
C. Cookie snooping
D. Authentication hijacking
Answer: A. Obfuscation application
Which of the following is a timing attack performed by measuring the approximate time taken by a server to process a POST request so that the existence of a username can be deduced?
A. Cross-site timing attack
B. Browser-based timing attack
C. Direct timing attack
D. Cache storage timing attack
Answer: C. Direct timing attack
Which of the following is a web application attack that is also known as a one-click attack and occurs when a hacker instructs a user’s web browser to send a request to a vulnerable website through a malicious web page?
A. Cookie snooping
B. Hidden field manipulation
C. Cross-site request forgery
D. Web service attack
Answer: C. Cross-site request forgery
In which of the following attacks does an attacker load the target website inside a low-opacity iframe?
A. RC4 NOMORE attack
B. Clickjacking attack
C. DNS rebinding attack
D. JavaScript hijacking
Answer: B. Clickjacking attack
The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?
A. Web application patches
B. A security certification for hardened web applications
C. An extensible security framework named COBIT
D. A list of flaws and how to fix them
Answer: D. A list of flaws and how to fix them
Which vulnerability is detected when a pop-up box appears on the screen with the text “Testing Testing Testing” after inserting the following test script into the search area on a company’s website?
A. Cross-site scripting
B. Hybrid attack
C. Buffer overflow
D. Password attacks
Answer: A. Cross-site scripting.
Which of the following attacks involves an attacker loading the target website inside a low-opacity iframe?
A. RC4 NOMORE attack
B. Clickjacking attack
C. DNS rebinding attack
D. JavaScript hijacking
Answer: B. Clickjacking attack
Which type of attack can occur due to flaws such as insecure cryptographic storage and information leakage?
A. Command injection
B. Sensitive data exposure
C. SQL injection
D. Shell injection
Answer: B. Sensitive data exposure
Which type of attack exploits vulnerabilities in dynamically generated webpages and enables malicious attackers to inject client-side scripts into webpages viewed by other users?
A. Cross-site scripting
B. Security misconfiguration
C. Sensitive data exposure
D. Broken access control
Answer: A. Cross-site scripting
What is the term used for a vulnerability that occurs when a threat detection software installed in an organization’s network fails to record a malicious event or ignores important details about the event?
A. Security Logging and Monitoring Failures
B. Sensitive data exposure
C. Security misconfiguration
D. Broken access control
Answer: A. Security Logging and Monitoring Failures
An attacker has been successfully modifying the purchase price of items purchased on a company’s website. The security administrators have verified that the webserver and Oracle database have not been directly compromised, and the intrusion detection system (IDS) logs show no attacks that could have caused this. What is the most likely way the attacker has been able to modify the purchase price?
A. By using cross-site scripting
B. By changing hidden form values
C. By utilizing a buffer overflow attack
D. By using SQL injection
Answer: B. By changing hidden form values
Which condition must be met to allow a tester to exploit a cross-site request forgery (CSRF) vulnerable web application?
A. The web application should not use random tokens.
B. The victim user must open a malicious link with Firefox prior to version 3.
C. The session cookies generated by the application do not have the HttpOnly flag set.
D. The victim user must open a malicious link with an Internet Explorer prior to version 8.
Answer: A. The web application should not use random tokens.
Which application security risk occurs as a result of failure in the implementation of proper key management systems or using old keys for protecting the sensitive data of an organization?
A. Injection
B. Cryptographic failures
C. Security misconfiguration
D. Software and data integrity failures
Answer: B. Cryptographic failures
Robert, a security professional, discovered that certain application functions related to session management and user validation methods were poorly implemented while examining a web application for potential vulnerabilities and protection from evolving threats. What type of application security risk did he discover in the scenario?
A. Cryptographic failures
B. Vulnerable and outdated components
C. Security logging and monitoring failures
D. Identification and authentication failures
Answer: D. Identification and authentication failures
Which of the following application security risks can arise from downloading updates from unauthorized or previously trusted sources without conducting sufficient security checks?
A. Vulnerable and outdated components
B. Security logging and monitoring failures
C. Software and data integrity failures
D. Identification and authentication failures
Answer: C. Software and data integrity failures
Which application security risk can arise due to inappropriate alert mechanisms for failed-login attempts or the inability of an application to identify threats in advance, which may result in leakage of sensitive information?
A. Vulnerable and outdated components
B. Security logging and monitoring failures
C. Server-side request forgery
D. Injection
Answer: B. Security logging and monitoring failures
which of the following attacks is also known as a related-domain attack, which occurs when an attacker targets a subdomain of a trusted organization and attempts to redirect users to an attacker-controlled web page?
A. DoS attack
B. Same-site attack
C. Direct timing attack
D. SQL injection attack
Answer: B. Same-site attack
Kristine, a user, was attempting to browse a website www.certifiedhacker.com. Alex, an attacker, on the other hand, redirected Kristine to a dangling site rans.certifiedhacker.com by luring Kristine into believing that the redirected site is a legitimate one. Kristine submitted her credentials on the malicious site, which Alex obtained.
In the above scenario, Kristine was redirected to a malicious site by an attacker who lured her into believing that the redirected site was legitimate. She submitted her credentials on the malicious site, which the attacker obtained. What type of attack did the attacker perform?
A. Source code disclosure
B. Buffer overflow attack
C. Same-site attack
D. SSH bruteforce attack
Answer: C. Same-site attack
Which of the following attacks occurs when attackers obtain a clone of a cookie from the user’s browser and use it to establish a session with the target web server, allowing them to access a user’s web services without providing any identity?
A. Pass-the-cookie attack
B. SSRF attack
C. Connection string parameter pollution
D. DNS rebinding attack
Answer: A. Pass-the-cookie attack
Which of the following is a security risk that arises due to the incorrect implementation of applications, allowing attackers to compromise passwords, keys, session tokens, and exploit user identity?
A. Broken authentication
B. Security misconfiguration
C. Injection
D. Sensitive data exposure
Answer: A. Broken authentication
Which clickjacking technique involves an attacker creating an iframe of 1 × 1 pixels containing malicious content placed secretly under the mouse cursor? When the user clicks on this cursor, it will be registered on a malicious page.
A. Rapid content replacement
B. Hidden overlay
C. Click event dropping
D. Complete transparent overlay
Answer: B. Hidden overlay
Which of the following is an application security threat that occurs when an application includes untrusted data in a new web page without proper validation or escaping, or when an application updates an existing web page with user-supplied data?
A. Security misconfiguration
B. Components with known vulnerabilities
C. XML external entity (XXE)
D. Cross-site scripting (XSS)
Answer: D. Cross-site scripting (XSS)
Which of the following is a web application attack that is also known as a one-click attack and occurs when a hacker instructs a user’s web browser to send a request to a vulnerable website through a malicious web page?
A. Hidden field manipulation
B. Cross-site request forgery
C. Cookie snooping
D. Web service attack
Answer: B. Cross-site request forgery (CSRF)
In which of the following attacks does an attacker trick or attract a user into accessing a legitimate web server using an explicit session ID value?
A. Malicious file execution
B. Session fixation attack
C. Security management exploits
D. Failure to restrict URL access
Answer: B. Session fixation attack
While testing web applications, you attempt to insert the following test script into the search area on the company’s website:
alert(“Testing Testing Testing”)
After pressing the search button, a pop-up box appears on your screen with the text “Testing Testing Testing.” What vulnerability is detected in the web application here?
A. A buffer overflow
B. Password attacks
C. A hybrid attack
D. Cross-site scripting
Answer: D. Cross-site scripting (XSS)