Hacking Web Servers Flashcards

1
Q

What is Web Server Misconfiguration?

A

Web server misconfiguration refers to the configuration weaknesses in web infrastructure that can be exploited to launch various attacks on web servers, such as directory traversal, server intrusion, and data theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Web Cache Poisoning Attack?

A

Web cache poisoning damages the reliability of an intermediate web cache source. In this attack, an attacker swaps cached content for a random URL with infected content. Users of the web cache source may unknowingly use the poisoned content instead of the true and secured content when requesting the required URL through the web cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Server-Side Request Forgery (SSRF) Attack?

A

Attackers exploit server-side request forgery (SSRF) vulnerabilities, which evolve from the unsafe use of functions in an application, in public web servers to send crafted requests to the internal or backend servers. Internal servers are usually implemented by firewalls to prevent the network from unwanted traffic inflows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Website Defacement?

A

Website defacement refers to the unauthorized changes made to the contents of a single webpage or an entire website, resulting in changes to the visual appearance of the website or a webpage. Hackers break into webservers and alter the hosted websites by injecting code in order to add images, popups, or text to a page in such a way that the visual appearance of the page changes. In some cases, the attackers may replace the entire website instead of just changing single pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is parameter/form tampering?

A

In a parameter/form tampering attack, the attacker manipulates the parameters exchanged between the client and server to modify application data, such as user credentials and permissions as well as price and quantity of products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Open Sez Me?

A

Open Sez Me is a lookup database for default passwords, credentials, and ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Open Sez Me?

A

Open Sez Me is a lookup database for default passwords, credentials, and ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is NCollector Studio?

A

NCollector Studio is a website mirroring tool used to download content from the web to a local computer. This tool enables users to crawl for specific file types, mak1e any website available for offline browsing, or simply download a website to a local computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Nikto2?

A

Nikto is a vulnerability scanner used extensively to identify potential vulnerabilities in web applications and web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which nmap command does an attacker use to enumerate common web applications?

A

nmap –script http-enum -p80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Metasploit, what is a single?

A

A single is a self-contained and completely standalone exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Metasploit, what is a stager payload?

A

Stager payloads work in conjunction with stage payloads in order to perform a specific task. A stager establishes a communication channel between the attacker and the victim and reads in a stage payload to execute on the remote host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Metasploit, what is a stage?

A

Stages are downloaded by stager modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which nmap command does an attacker use to detect HTTP trace?

A

nmap -p80 –script http-trace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which technique defends servers against blind response forgery

A

UDP source port randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is N-Stalker?

A

N-Stalker is a web application security scanner that searches for vulnerabilities to attacks such as clickjacking, SQL injection, and XSS. It allows spider crawling throughout the application and the creation of web macros for form authentication. It also provides proxy capabilities for “drive-thru” attacks and identifies components through reverse proxies that distribute different platforms in the same application URL

17
Q

What is mimikatz?

A

Mimikatz allows attackers to pass Kerberos TGT to other computers and sign in using the victim’s ticket. The tool also helps in extracting plaintext passwords, hashes, PIN codes, and Kerberos tickets from memory