Web application security - the fast guide 1.1 | Page 112
Chapter 5 - Attack Execution the client
P a g e | 112
8. In Phishing attack:
a. The attacker main entry point is a vulnerability in the visual
representation of the site.
b. Normally Phishing site is hosted on a machine own and registered
by the attacker.
c. Attacker creates a powerful motive for victim to act and a
malicious link to click
d. Phishing is an exploit based attack because it depends on technical
vulnerabilities in the used HTTP protocol.
9. Passing critical information in hidden fields if it is not rechecked on
server:
a. It is secure as hiding obscurity prevent the attacker from capturing
the value
b. Is Secure if the value is hashed with known algorithm like MD5.
c. Is Secure if the value is hashed with unknown algorithm
d. None of the above.
10. Initiating an attack on a web application:
a. Can be as simple as changing a parameter in URL
b. Cannot be achieved only by securing the server
c. Is doable through methods that sometimes requires minimum
technical knowledge
d. All the above
Answers key
1
a
2
d
3
d
4
b
5
b
6
a
7
d
8
c
9
d
10
d