Web App Testing Flashcards
What are the 3 types of XSS attacks?
Stored, Reflected, Dom-Based
Describe Stored XSS.
This is a type of web application vulnerability where an attacker injects malicious JavaScript code into a web application, and this code is stored on the server (in a database, file, or other persistent storage).
Describe Reflected XSS.
This is a type of web application vulnerability where malicious JavaScript code is injected into a website via a user-supplied input (such as a URL, query parameter, or form input). This code is immediately reflected back by the server in the response, and is executed in the user’s browser when they visit the malicious URL.
Describe Dom-Based XSS.
This is a type of Cross-Site Scripting (XSS) vulnerability where the attack is executed entirely on the client-side (in the user’s browser) rather than being reflected or stored on the server.
What is SQL Injection?
This is a type of attack where an attacker exploits vulnerabilities in a web application’s input fields (such as forms, search bars, or URLs) to manipulate an SQL query.
List the OWASP top 10.
- Broken Access Control
- Cryptographic Failures
- Injection
- Insecure Design
- Security Misconfiguration
- Vulnerable and Outdated Components
- Identification and Authentication Failures
- Software and Data Integrity Failures
- Security Logging and Monitoring Failures
- Server-Side Request Forgery (SSRF)
List 5 types of SQL Injection.
- In-Band SQL Injection (Error-Based, Union-Based)
- Blind SQL Injection (Boolean-Based, Time-Based)
- Out-of-Band SQL Injection
- Second-Order SQL Injection
- Tautology-Based SQL Injection