Wapt Test 2 Flashcards

1
Q
  1. Clent Certificate Authentication
  2. Form Based Authentication
  3. Two-Factor auth
  4. Basic Authentication
A

Basic Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Based on this snippet from an authentication session intercept. Which statement is most likely to describe the security posture?
1. Security of the application will depend entirely on developers implimentation.
2. Due to user lockout, this app is vuln to MITM attacks
3. The exloitable link inthis authenticatioin scheme is the cliehnt machine.

A
  1. Security of the application will depend entirely on developers implimentation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Burp tool can assist an analyst in manual logic flaw testing?
1. Extender
2. Sequencer
3. Intruder
4. Repeater

A
  1. Repeater
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

if the @8.8.8.8 was removed from the command bellow, what would occur?
dig @8.8.8.8 giac.org -t mx
1. Command will fail because a DNS server is not specified
2. The default DNS server for the target will be queried
3. The root name server for the zone will be queried
4. The default DNS server for the host machine will be queried

A
  1. The default DNS server for the host machine will be queried
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What foundational technology enables the creation of dynamic web pages?
1. Simple Object Access Protocol
2. Document Object Model
3. Hypertext Transfer Protocol/3
4. JavaScript Object Notation

A
  1. DOM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is an example of a false positive when using automated scanner?
1. An SSH server discovered on a non standardard port
2. initial TTL Values that are set unusually low
3. IIS vulnerabilities on an Apache Server
4. A RST/ACK packet from a terminated session

A
  1. IIS Vulnerabilities on an Apache Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following can be used by a dev to prevent HTML injection attacks?
1. input sanitization
2. Same Origin Policy enforcement
3. Key management
4. Session validation

A
  1. Input Sanitization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following fields would appear in an HTTP Request header?
1. Allow: Post, Head
2. Server: Apache/1.3.26 (Red-Hat/Linux)
3. Host: www.company.org
4. Set-Cookie: UserID=LDoppler; max-age=3600

A
  1. Host: www.company.org

Methods allowed, Set Cookie, and Server fields are all in the HTTP Resp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the first line of an HTTP Response?
1. Server Name
2. Status Code
3. Character Set
4. Content Type

A
  1. Status Code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What flaw exists in an application that retrieves a resource using user-supplied input without validating the account is authorized to access it?
1. Parameter Tampering
2. Direct Page Access
3. Ajax Same Origin Policy Evasion
4. Insecure Direct Object Reference.

A
  1. Insecure Direct Object Reference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A pentester enteres a series of strings into a search field on a web app server to determine the num of columns and types of data.
** levi’ UNION SELECT NULL; –
levi’ UNION SELECT NULL, NULL;–
etc**
Not mater how many NULLS no attemp is succesful. What is the problem?

  1. He did not ORDER BY attack strings before this UNION
  2. A NULL is not matchiing a column’s data type
  3. Oracle is the backend DB
  4. the attack string requires column names
A
  1. Oracl is the backend DB
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Given the URL bellow, which type of attack would most likely to succeed?
http://www.giac.net/php/index.php?lang=de-utf &&convcharset-iso-888&conenection=utf8_unicode_ci
1. cookie theft
2. reflective XSS
3. HTTP referer

A
  1. Reflective xss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of Same-Origine Policy in providing web application security in a browsers memory?
1. Stopping a browser from running dangerious scipts
2. Prohibiting a web session from running externally sourced scripts
3. Controlling interaction between code from different users
4. Preventing client from accessing a malicious site

A
  1. Controlling interactions between code from different servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which statement would be found in the Scope section for a web app pen test?
1. Updates to the pentester’s virtual machine and tools will be applied manualy and validated against the tester’s lab target
2. Client is responsible for contacting their hosting service and scheduling the test with them
3. Targets of the test will not block pentesters IP addresses
4. Backups of the target environment will be performed prior to the test

A
  1. Client is responsible for contacting their hosting service and scheduling the test with them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the followoing is recommended method of maintaining web app session state?
1. Ses management as defined by the HTTP protocol
2. Ses management built into the web framework
3. Ses management provided by the OS
4. Ses management created by the applictions dev

A
  1. Ses management built into the web framework.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the followoing is recommended method of maintaining web app session state?
1. Ses management as defined by the HTTP protocol
2. Ses management built into the web framework
3. Ses management provided by the OS
4. Ses management created by the applictions dev

A
  1. Ses management built into the web framework.
17
Q

A SQL table column includes the following data. What data type is most likely used
amarquez
bogrady
jsmith
1. CHAR
2. BOOL
3. VARCHAR
4. BINARY

A
  1. VARCHAR

VARCHAR allows for strings of variable lenght

18
Q
A

A.

19
Q

Which section of a web application pentest report outlines relevant detail, constrants, results, information like tgt IP and summary of recommended fixes?
1. Findings.
2. Appendices
3. Test Parameters
4. Executive Summary

A
  1. Test Parameters