Module 14 - Hacking Web Application ( EC Mode Part 01 ) Flashcards
(99 cards)
Which of the following attacks can take place due to flaws such as insecure cryptographic storage and information leakage?
A. SQL injection
B. Command injection
C. Sensitive data exposure
D. Shell injection
Answer: C. Sensitive data exposure
Which of the following attacks exploits vulnerabilities in dynamically generated webpages, which enables malicious attackers to inject client-side scripts into webpages viewed by other users?
A. Broken access control
B. Security misconfiguration
C. Cross-site scripting
D. Sensitive data exposure
Answer: C. Cross-site scripting
A security analyst in an insurance company is assigned to test a new web application that will be used by clients to help them choose and apply for an insurance plan. The analyst discovers that the application has been developed in ASP scripting language and it uses MSSQL as a database backend. The analyst locates the application’s search form and introduces the following code in the search input field: IMG SRC=vbscript:msgbox(“Vulnerable”);> originalAttribute=”SRC” originalPath=”vbscript:msgbox(“Vulnerable”);>”
When the analyst submits the form, the browser returns a pop-up window that says “Vulnerable.”
Which web applications vulnerability did the analyst discover?
A. SQL injection
B. Command injection
C. Cross-site scripting
D. Cross-site request forgery
Answer: C. Cross-site scripting
An attacker has been successfully modifying the purchase price of items purchased on the company’s website. The security administrators verify the webserver and Oracle database have not been compromised directly. They have also verified the intrusion detection system (IDS) logs and found no attacks that could have caused this. What is the most likely way the attacker has been able to modify the purchase price?
A. By using cross site scripting
B. By changing hidden form values
C. By using SQL injection
D. By utilizing a buffer overflow attack
Answer: B. By changing hidden form values
An attacker identifies the kind of websites a target company/individual is frequently surfing and tests those particular websites to identify any possible vulnerabilities. When the attacker identifies the vulnerabilities in the website, the attacker injects malicious script/code into the web application that can redirect the webpage and download the malware onto the victim’s machine. After infecting the vulnerable web application, the attacker waits for the victim to access the infected web application. What kind of an attack is this?
A. Phishing attack
B. Water hole attack
C. Denial-of-service attack
D. Jamming attack
Answer: B. Water hole attack
Which of the following application security risks occurs as a result of failure in the implementation of proper key management systems or using old keys for protecting the sensitive data of an organization?
A. Cryptographic failures
B. Injection
C. Security misconfiguration
D. Software and data integrity failures
Answer: A. Cryptographic failures
Which of the following application security risks can be evolved as a result of downloading updates from unauthorized or previously trusted sources without conducting sufficient security checks?
A. Vulnerable and outdated components
B. Identification and authentication failures
C. Security logging and monitoring failures
D. Software and data integrity failures
Answer: D. Software and data integrity failures
Identify the application security risk that can arise because of inappropriate alert mechanisms for failed-login attempts, or the application cannot identify threats in advance, which may result in leakage of sensitive information.?
A. Vulnerable and outdated components
B. Security logging and monitoring failures
C. Server-side request forgery
D. Injection
Answer: B. Security logging and monitoring failures
Which of the following is a web security vulnerability that arises when remote resources are obtained by an application without verifying the URL entered by the user and are exploited by the attackers to read or modify internal resources and steal sensitive information?
A. Identification and authentication failures
B. Server-side request forgery
C. Software and data integrity failures
D. Insecure design
Answer: B. Server-side request forgery
Which of the following is a vulnerability that allows attackers to add their parameters to a URL to redirect users from trusted websites to malicious sites where they can steal sensitive user data and redirect users back to the original website?
A. Direct timing attack
B. Banner grabbing
C. Header-based open redirection
D. Open redirection
Answer: D. Open redirection
Which of the following involves the process of modifying the HTTP location header to redirect users to a malicious page without their knowledge?
A. LDAP injection
B. HTML injection
C. Header-based open redirection
D. Directory traversal
Answer: C. Header-based open redirection
Which of the following attacks is also known as a related-domain attack, which occurs when an attacker targets a subdomain of a trusted organization and attempts to redirect users to an attacker-controlled web page?
A. Direct timing attack
B. DoS attack
C. Same-site attack
D. SQL injection attack
Answer: C. Same-site attack
Which of the following attacks occurs when attackers obtain a clone of a cookie from the user’s browser and use it to establish a session with the target web server and further allow attackers to access a user’s web services without providing any identity?
A. DNS rebinding attack
B. Pass-the-cookie attack
C. SSRF attack
D. Connection string parameter pollution
Answer: B. Pass-the-cookie attack
In which of the following types of injection attacks does an attacker exploit vulnerable form inputs, inject HTML code into a webpage, and change the website appearance?
A. HTML injection
B. HTML embedding
C. Shell injection
D. File injection
Answer: A. HTML injection
Which of the following attacks allows an attacker to encode portions of the attack with Unicode, UTF-8, Base64, or URL encoding to hide their attacks and avoid detection?
A. Obfuscation application
B. Network access attack
C. Cookie snooping
D. Authentication hijacking
Answer: A. Obfuscation application
Which of the following is a timing attack performed by measuring the approximate time taken by a server to process a POST request so that the existence of a username can be deduced?
A. Cross-site timing attack
B. Browser-based timing attack
C. Direct timing attack
D. Cache storage timing attack
Answer: C. Direct timing attack
Which of the following is a web application attack that is also known as a one-click attack and occurs when a hacker instructs a user’s web browser to send a request to a vulnerable website through a malicious web page?
A. Cookie snooping
B. Hidden field manipulation
C. Cross-site request forgery
D. Web service attack
Answer: C. Cross-site request forgery
In which of the following attacks does an attacker load the target website inside a low-opacity iframe?
A. RC4 NOMORE attack
B. Clickjacking attack
C. DNS rebinding attack
D. JavaScript hijacking
Answer: B. Clickjacking attack
The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?
A. Web application patches
B. A security certification for hardened web applications
C. An extensible security framework named COBIT
D. A list of flaws and how to fix them
Answer: D. A list of flaws and how to fix them
Which vulnerability is detected when a pop-up box appears on the screen with the text “Testing Testing Testing” after inserting the following test script into the search area on a company’s website?
A. Cross-site scripting
B. Hybrid attack
C. Buffer overflow
D. Password attacks
Answer: A. Cross-site scripting.
Which of the following attacks involves an attacker loading the target website inside a low-opacity iframe?
A. RC4 NOMORE attack
B. Clickjacking attack
C. DNS rebinding attack
D. JavaScript hijacking
Answer: B. Clickjacking attack
Which type of attack can occur due to flaws such as insecure cryptographic storage and information leakage?
A. Command injection
B. Sensitive data exposure
C. SQL injection
D. Shell injection
Answer: B. Sensitive data exposure
Which type of attack exploits vulnerabilities in dynamically generated webpages and enables malicious attackers to inject client-side scripts into webpages viewed by other users?
A. Cross-site scripting
B. Security misconfiguration
C. Sensitive data exposure
D. Broken access control
Answer: A. Cross-site scripting
What is the term used for a vulnerability that occurs when a threat detection software installed in an organization’s network fails to record a malicious event or ignores important details about the event?
A. Security Logging and Monitoring Failures
B. Sensitive data exposure
C. Security misconfiguration
D. Broken access control
Answer: A. Security Logging and Monitoring Failures