Web App Testing Flashcards

(18 cards)

1
Q

What are the 3 types of XSS attacks?

A

Stored, Reflected, Dom-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe Stored XSS.

A

This is a type of web application vulnerability where an attacker injects malicious JavaScript code into a web application, and this code is stored on the server (in a database, file, or other persistent storage).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe Reflected XSS.

A

This is a type of web application vulnerability where malicious JavaScript code is injected into a website via a user-supplied input (such as a URL, query parameter, or form input). This code is immediately reflected back by the server in the response, and is executed in the user’s browser when they visit the malicious URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Dom-Based XSS.

A

This is a type of Cross-Site Scripting (XSS) vulnerability where the attack is executed entirely on the client-side (in the user’s browser) rather than being reflected or stored on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SQL Injection?

A

This is a type of attack where an attacker exploits vulnerabilities in a web application’s input fields (such as forms, search bars, or URLs) to manipulate an SQL query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the OWASP top 10.

A
  1. Broken Access Control
  2. Cryptographic Failures
  3. Injection
  4. Insecure Design
  5. Security Misconfiguration
  6. Vulnerable and Outdated Components
  7. Identification and Authentication Failures
  8. Software and Data Integrity Failures
  9. Security Logging and Monitoring Failures
  10. Server-Side Request Forgery (SSRF)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List 5 types of SQL Injection.

A
  1. In-Band SQL Injection (Error-Based, Union-Based)
  2. Blind SQL Injection (Boolean-Based, Time-Based)
  3. Out-of-Band SQL Injection
  4. Second-Order SQL Injection
  5. Tautology-Based SQL Injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are four types of server side vulnerabilities?

A
  1. Server-Side Request Forgery (SSRF)
  2. Server-Side Template Injection (SSTI)
  3. Server-Side Includes Injection (SSI)
  4. eXtensible Stylesheet Language Transformations (XLST) Server-Side Injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Server-Side Request Forgery (SSRF)

A

This is a vulnerability where an attacker can manipulate a web app into sending unauthorized requests from the web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe Server-Side Template Injection (SSTI)

A

This vulnerability occurs when user input is unsafely embedded in server-side templates, allowing attackers to inject and execute template code on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe Server-Side Includes Injection (SSI)

A

This vulnerability occurs when user input is unsafely included in SSI directives, allowing attackers to inject and execute server-side commands or scripts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe eXtensible Stylesheet Language Transformations (XLST) Server-Side Injection

A

An XSLT vulnerability occurs when user input is unsafely incorporated into XSLT transformations, allowing attackers to inject and execute arbitrary XSLT code on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe a real world example of SSRF.

A

A web app allows users to provide a URL to fetch and display a profile picture. If the app does not properly validate the URL, an attacker may specify an internal address such as http://localhost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe a real world example of SSI.

A

SSI can be used to include content that is present in all HTML pages, such as headers or footers. When an attacker can inject commands into the SSI directives, Server-Side Includes (SSI) Injection can occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can exploitation of a SSRF vulnerability lead to?

A

accessing internal systems, bypassing firewalls, and retrieving sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe a real world example of SSTI.

A

One example is when a web application uses user input directly in a server-side template such as:
template = “Hello, “ + user_input
render(template).
If an attacker supplies {{7*7}} as input, and the template engine evaluates it, the output will be Hello, 49, demonstrating that arbitrary template code can be injected and executed.

17
Q

Describe SSI Directives

A

SSI directives are special commands embedded in web pages (usually within HTML comments like <!--#echo var="DATE_LOCAL" -->) that instruct the web server to perform actions such as including files, executing scripts, or displaying environment variables before sending the page to the user.

18
Q

Describe XLST Transformations

A

XSLT transformations are processes where XML data is converted into other formats (such as HTML, plain text, or different XML structures) using XSLT (Extensible Stylesheet Language Transformations) stylesheets that define how the data should be transformed and presented.