Hacking Web Applications Flashcards

1
Q

What are the 7 layers of the web application vulnerability stack?

A

Layer 7: Custom Web Application(s) - Logic Flaws
Layer 6: Third Party Components - Frameworks, Languages, 3rd party integrations like Amazon Login - Zend, Symfony, PHP
Layer 5: Web Server - IIS, Apache, Nginx
Layer 4: Database - Oracle, MySQL, MSSQL, etc.
Layer 3: OS - Windows/Linux
Layer 2: Network - Router/Switch
Layer 1: Security - IPS/IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following components of the web service architecture is an extension of SOAP and can be used to maintain the integrity and confidentiality of SOAP messages?

WS-Security
UDDI
WSDL
WS-Policy

A

WS-Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Web Application Security, what are the impacts of broken authentication?

A

Application functions related to authentication and session management are often implemented incorrectly, thereby allowing attackers to compromise passwords, keys, or session tokens or to exploit other implementation flaws to assume identities of other users (temporarily or permanently).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Web Application Security, what are the impacts of injection?

A

Injection flaws, such as SQL, command injection, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In Web Application Security, what are the impacts of sensitive data exposure?

A

Many web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and personally identifiable information (PII) data. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data requires extra protection such as encryption at rest or in transit, as well as special precautions when exchanged with the browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In Web Application Security, what are the impacts of security misconfiguration?

A

Security misconfiguration is the most common issue in web security, which is due in part to manual or ad hoc configuration (or no configuration at all), insecure default configurations, open S3 buckets, misconfigured HTTP headers, error messages containing sensitive information, and not patching or upgrading systems, frameworks, dependencies, and components in a timely manner (or at all).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a direct timing attack?

A

Direct timing attacks are carried out by measuring the approximate time taken by the server to process a POST request to deduce the existence of a username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a cross-site timing attack?

A

A cross-site timing attack is another type of timing attack, in which attackers send crafted request packets to the website using JavaScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a browser-based timing attack?

A

Attackers take advantage of side-channel leaks of a browser to estimate the time taken by the browser to process the requested resources. Attackers can abuse different browser functionalities to launch further attacks such as video parsing attacks and cache storage timing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a cache storage timing attack?

A

The Cache API interface (used to load, fetch, and delete any responses) offers complete cache (memory) to the developers. Loading resources in the disk takes some amount of time based on the resource size. If attackers can estimate the time taken by the browser to perform this task, they can measure the corresponding response size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Web Application Security, what is a network access attack?

A

Network access attacks can majorly affect web applications, including a basic level of service. They can also allow levels of access that standard HTTP application methods cannot grant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Web Application Security, what is a captcha attack?

A

CAPTCHA is a challenge-response type of test implemented by web applications to check whether the response is generated by a computer. Although CAPTCHAs are designed to be unbreakable, they are prone to various types of attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Web Application Security, what is cropping?

A

In cropping, only the selected controls from the transparent page are overlaid. This technique depends on the goal of the attack and may involve masking buttons with hyperlinks and text labels with false information, changing the button labels with wrong commands, and completely covering the legitimate page with misleading information while exposing only one original button.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Web Application Security, what is click event dropping?

A

This technique can completely hide a malicious page behind a legitimate page. It can also be used to set the CSS pointer-events property of the top to none. This can cause click events to drop through the legitimate masked page and registers only the malicious page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In Web Application Security, what is rapid content replacement?

A

In rapid content replacement, the targeted controls are covered by opaque overlays that are removed only for a moment for registering a click. An attacker using this technique needs to accurately predict the time taken by the victim to click on the web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In Web Application Security, what is a complete transparent overlay?

A

In this technique, the transparent, legitimate page or tool page is overlaid on the previously designed malicious page. Then, it is loaded into an invisible iframe and the higher z-index value is assigned for positioning it on top

17
Q

Which of the following HTTP service port numbers is used for connecting to a remote network server system?

Port 81
Port 80
Port 384
Port 88

A

Port 384

18
Q

In Web Application Security, what is hash stealing?

A

Replaces the value of the Data Source parameter with that of a Rogue Microsoft SQL Server and sets the values of username, data source, and integrated security

19
Q

In Web Application Security, what is an ActiveX Attacks?

A

Attackers lure victims via email or via a link that is constructed such that the loopholes of remote execution code become accessible, allowing the attackers to obtain access privileges equal to those of authorized users

20
Q

What is Session Poisoning?

A

Session poisoning allows an attacker to inject malicious content, modify the user’s online experience, and obtain unauthorized information.