Wapt Test 2 Flashcards
- Clent Certificate Authentication
- Form Based Authentication
- Two-Factor auth
- Basic Authentication
Basic Authentication
Based on this snippet from an authentication session intercept. Which statement is most likely to describe the security posture?
1. Security of the application will depend entirely on developers implimentation.
2. Due to user lockout, this app is vuln to MITM attacks
3. The exloitable link inthis authenticatioin scheme is the cliehnt machine.
- Security of the application will depend entirely on developers implimentation.
Which Burp tool can assist an analyst in manual logic flaw testing?
1. Extender
2. Sequencer
3. Intruder
4. Repeater
- Repeater
if the @8.8.8.8 was removed from the command bellow, what would occur?
dig @8.8.8.8 giac.org -t mx
1. Command will fail because a DNS server is not specified
2. The default DNS server for the target will be queried
3. The root name server for the zone will be queried
4. The default DNS server for the host machine will be queried
- The default DNS server for the host machine will be queried
What foundational technology enables the creation of dynamic web pages?
1. Simple Object Access Protocol
2. Document Object Model
3. Hypertext Transfer Protocol/3
4. JavaScript Object Notation
- DOM
Which of the following is an example of a false positive when using automated scanner?
1. An SSH server discovered on a non standardard port
2. initial TTL Values that are set unusually low
3. IIS vulnerabilities on an Apache Server
4. A RST/ACK packet from a terminated session
- IIS Vulnerabilities on an Apache Server
Which of the following can be used by a dev to prevent HTML injection attacks?
1. input sanitization
2. Same Origin Policy enforcement
3. Key management
4. Session validation
- Input Sanitization
Which of the following fields would appear in an HTTP Request header?
1. Allow: Post, Head
2. Server: Apache/1.3.26 (Red-Hat/Linux)
3. Host: www.company.org
4. Set-Cookie: UserID=LDoppler; max-age=3600
- Host: www.company.org
Methods allowed, Set Cookie, and Server fields are all in the HTTP Resp
Which of the following is the first line of an HTTP Response?
1. Server Name
2. Status Code
3. Character Set
4. Content Type
- Status Code
What flaw exists in an application that retrieves a resource using user-supplied input without validating the account is authorized to access it?
1. Parameter Tampering
2. Direct Page Access
3. Ajax Same Origin Policy Evasion
4. Insecure Direct Object Reference.
- Insecure Direct Object Reference
A pentester enteres a series of strings into a search field on a web app server to determine the num of columns and types of data.
** levi’ UNION SELECT NULL; –
levi’ UNION SELECT NULL, NULL;–
etc**
Not mater how many NULLS no attemp is succesful. What is the problem?
- He did not ORDER BY attack strings before this UNION
- A NULL is not matchiing a column’s data type
- Oracle is the backend DB
- the attack string requires column names
- Oracl is the backend DB
Given the URL bellow, which type of attack would most likely to succeed?
http://www.giac.net/php/index.php?lang=de-utf &&convcharset-iso-888&conenection=utf8_unicode_ci
1. cookie theft
2. reflective XSS
3. HTTP referer
- Reflective xss
What is the purpose of Same-Origine Policy in providing web application security in a browsers memory?
1. Stopping a browser from running dangerious scipts
2. Prohibiting a web session from running externally sourced scripts
3. Controlling interaction between code from different users
4. Preventing client from accessing a malicious site
- Controlling interactions between code from different servers
Which statement would be found in the Scope section for a web app pen test?
1. Updates to the pentester’s virtual machine and tools will be applied manualy and validated against the tester’s lab target
2. Client is responsible for contacting their hosting service and scheduling the test with them
3. Targets of the test will not block pentesters IP addresses
4. Backups of the target environment will be performed prior to the test
- Client is responsible for contacting their hosting service and scheduling the test with them
Which of the followoing is recommended method of maintaining web app session state?
1. Ses management as defined by the HTTP protocol
2. Ses management built into the web framework
3. Ses management provided by the OS
4. Ses management created by the applictions dev
- Ses management built into the web framework.