Web application security - the fast guide 1.1 | Page 172

Chapter 8 - Attack Tools P a g e | 172 6. When there is a necessity to write a customized .NET code to handle intercepted requests we better use: a. Google RAT b. FIDDLER c. BURP INTRUDER d. PAROS PROXY 7. One of the main advantages of standalone interception proxy tools that: a. It provides ability to intercept http requests. b. It provides tempering ability of the intercepted data c. It provides the ability to resubmit the tempered request. d. It provides the ability to intercept non browsers requests 8. Google Rat proxy uses: a. Passive mode proxying approach b. Active mode as it needs the user to take action to prepare each request. c. A humanly readable log and visual interface. d. All the above 9. The following code $ nc -z host.example.com 20-30 a. cURL command line tool to enable No Connection mode to site example.com. b. A port scanning attempt using netcat c. Retrieving input from host.example.com for result of expression (20-30) d. None of the above Answers key 1 a 2 c 3 d 4 d 5 1h2h3g4f4e5d5c5b5a 6 b 7 d 8 a 9 b 10 a