Hacking Web Applications Flashcards

1
Q

What is SOAP and what is it used for?

A

Simple Object Access Protocol:
XML-based protocol for exchanging information in a decentralized, distributed environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kind of Vulnerability is SOAP (Simple Object Access Protocol) Vulnerable to?

A

XPath Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Virtual Hosts and where are they used?

A

Used in Shared Web Servers, when website is accessed it is directed to a specific directory within a single shared server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Digital Certificate?

A

Electronic File That is Used to Verify a User’s or Server’s Identity (Provides Non-Repudiation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technology is NOT PKI x.509 compliant and cannot be used in various secure functions?
1. AES
2. PKCS
3. Blowfish
4. SSL/TLS

A
  1. Blowfish
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In SQL, what are parameterised queries (or Prepared Statements) used for?

A

To prevent SQL injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List 3 most popular Web Servers

A
  1. Apache
  2. Nginx
  3. IIS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is meant by N-Tier Architecture?

List the 3 category types

A
  1. Presentation (web)
  2. Logic (application)
  3. Data (database)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do the Internet Engineering Task Force (IETF) do?

A

Creates engineering documents to help make the
Internet work better

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the World Wide Web Consortium (W3C)?

A

A standards-developing community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do Open Web Application Security Project (OWASP) do?

A

Organization focused on improving the security of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of HTTP status codes start with 1xx? (E.g. HTTP 100)

A

Informational - Response indicates that the request was received and understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of HTTP status codes start with 2xx? (HTTP 200)

A

Success - Indicates the action requested by the client was received, understood, accepted and successful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of HTTP status code starts with 3xx? (HTTP 300)

A

Redirection - Indicates the client must take additional action to complete the request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of HTTP status code starts with 4xx? (HTTP 404)

A

Client Errors - Intended for situations in which the error seems to have been caused by the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of HTTP status code starts with 5xx (HTTP 500

A

Server Errors - Server is aware that it has encountered an error or is otherwise incapable of performing the request

17
Q

What is a DNS amplification attack?

A

Using recursive DNS servers to perform DoS towards the target. DNS answers get amplified.

18
Q

What kind of tool is WFETCH?

A

Microsoft tool that allows HTTP request debugging.

19
Q

What is a Connection String Parameter Pollution attack?

A

Injection attack that uses semicolons to take advantage of databases that use ; separation method.

20
Q

What is a Integer Overflow attack?

A

Leads to buffer overflow, integer numbers exceeds its limit leading to overwrite elements in memory.

21
Q

What is the most common False Positive Finding for an automated Web App Scan?

A

Version disclosure of server information

22
Q

Which of the following items is unique to the N-tier architecture method of designing software applications?

A. Application layers can be separated, allowing each layer to be upgraded independently from other layers
B. It is compatible with various databases including Access, Oracle, and SQL.
C. Data security is tied into each layer and must be updated for all layers when any upgrade is performed.
D. Application layers can be written in C, ASP.NET, or Delphi without any performance loss.

A

A. Application layers can be separated, allowing each layer to be upgraded independently from other layers

23
Q

Which type of web application server does ISAPI filters apply to?

A

IIS

24
Q

Why should the security analyst disable/remove unnecessary ISAPI filters?

A

To defend against webserver attacks

25
Q

What is the name of the log file for apache servers?

A

access_log

located in: /var/log/httpd/access_log

26
Q

Why is it best to disable ISAPI filters?

A

To defend against web based attacks.

27
Q

What type of tool is Paros Proxy?

A

HTTP Interceptor for assessing web based vulnerabilities

28
Q

What is a Watering Hole Attack?

A

Targeted attack designed to compromise users within a specific industry or group of users by infecting websites they typically visit and luring them to a malicious site

29
Q

What are the 3 types of SQL Injection attack?

A
  1. Error-based
  2. Blind
  3. Union
30
Q

What type of an attack is R-U-Dead-Yet?(RUDY)?

A

DoS Starvation attack of available sessions on the web server by sending never-ending POST requests.