Web application security - the fast guide 1.1 | Page 172
Chapter 8 - Attack Tools
P a g e | 172
6. When there is a necessity to write a customized .NET code to handle
intercepted requests we better use:
a. Google RAT
b. FIDDLER
c. BURP INTRUDER
d. PAROS PROXY
7. One of the main advantages of standalone interception proxy tools
that:
a. It provides ability to intercept http requests.
b. It provides tempering ability of the intercepted data
c. It provides the ability to resubmit the tempered request.
d. It provides the ability to intercept non browsers requests
8. Google Rat proxy uses:
a. Passive mode proxying approach
b. Active mode as it needs the user to take action to prepare each
request.
c. A humanly readable log and visual interface.
d. All the above
9. The following code
$ nc -z host.example.com 20-30
a. cURL command line tool to enable No Connection mode to site
example.com.
b. A port scanning attempt using netcat
c. Retrieving input from host.example.com for result of expression
(20-30)
d. None of the above
Answers key
1
a
2
c
3
d
4
d
5
1h2h3g4f4e5d5c5b5a
6
b
7
d
8
a
9
b
10
a