PBQ (ATTACKS and Mitigation) Flashcards
(5 cards)
21.16.163.17 - - [12/Mar/2021:22:31:12 0500]
“GET /items.jsp?<SCRIPT>userspy</SCRIPT>.jsp HTTP/1.1” 200
Attack = XSS, Control = Input Validation and Sanitization
87.12.31.57 - - [12/Dec/2020:08:22:27 0100]
“GET /items/items.asp?itemid=999% UNION%SELECT%user-name, password%FROM%USERS”…
Attack = SQL Injection, Control = Use prepared statements with variable binding
74.236.12.4 - - [4/June/2020:03:26:27 0100]
“GET /customer_account?customer_number=132355”…
74.236.12.4 - - [4/June/2020:03:25:27 0100]
“GET /customer_account?customer_number=254784”…
Attack = Insecure Object Reference
Control = Utilize indirect references
Which vulnerability had a wide footprint due to the OpenSSL implementation of the TLS layer?
HeartBleed is a security vulnerability discovered in OpenSSL cryptographic software library
What controls can be put in place to mitigate SQL Injection Vulnerabilities?
Using prepared statements and variable binding