Web application security - the fast guide 1.1 | Page 155
Chapter 7 - Attack execution (3)
P a g e | 155
7.12 QUIZ:
1. Most of operating system attacks through application are caused by:
a. Passing malicious parameters to CGI
b. Injected inputs passed to execution functionality API like (exec in
php)
c. Special characters that will have special meaning in the context of
used OS
d. All the above.
2. To attack a webserver file system attacker should begin searching
for:
a. If a weak password exists.
b. Intersected functionalities having different privilege level
c. Dynamically inserted code or paths
d. Impersonated functionalities
3. Path traversal sequence can be effectively used in:
a. Brute force attack
b. Session hijacking
c. File system attack
d. All the above
4. Path traversal sequence can be effectively used in:
a. Brute force attack
b. Session hijacking
c. File system attack
d. All the above
5. Mail service attack is dangerous due to the fact that:
a. Victim is used as a spam zombie and hold legal responsibility
b. it causes a great damage to files and directory structure.
c. It is a persistent type of attacks that affect anyone visits the
vulnerable website.
d. All the above
6. The main difference between SMTP injection and SMTP header
manipulation is:
a. SMTP injection can be done even with input sanitization.
b. SMTP header manipulation allow higher level of control over file
system.
c. SMTP header manipulation allow sending spam mail I time where
it is not doable with SMTP injection.
d. SMTP injection can generate a message totally control by attacker.
7. Attacking XML is possible only when:
a. Echo functionality is available.