Web App Testing Flashcards

1
Q

What are the 3 types of XSS attacks?

A

Stored, Reflected, Dom-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe Stored XSS.

A

This is a type of web application vulnerability where an attacker injects malicious JavaScript code into a web application, and this code is stored on the server (in a database, file, or other persistent storage).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe Reflected XSS.

A

This is a type of web application vulnerability where malicious JavaScript code is injected into a website via a user-supplied input (such as a URL, query parameter, or form input). This code is immediately reflected back by the server in the response, and is executed in the user’s browser when they visit the malicious URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Dom-Based XSS.

A

This is a type of Cross-Site Scripting (XSS) vulnerability where the attack is executed entirely on the client-side (in the user’s browser) rather than being reflected or stored on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SQL Injection?

A

This is a type of attack where an attacker exploits vulnerabilities in a web application’s input fields (such as forms, search bars, or URLs) to manipulate an SQL query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the OWASP top 10.

A
  1. Broken Access Control
  2. Cryptographic Failures
  3. Injection
  4. Insecure Design
  5. Security Misconfiguration
  6. Vulnerable and Outdated Components
  7. Identification and Authentication Failures
  8. Software and Data Integrity Failures
  9. Security Logging and Monitoring Failures
  10. Server-Side Request Forgery (SSRF)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List 5 types of SQL Injection.

A
  1. In-Band SQL Injection (Error-Based, Union-Based)
  2. Blind SQL Injection (Boolean-Based, Time-Based)
  3. Out-of-Band SQL Injection
  4. Second-Order SQL Injection
  5. Tautology-Based SQL Injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly