Web application security - the fast guide 1.1 | Page 86

Chapter 4 - Be the attacker P a g e | 86 6. Collecting information about intermediaries can be done through: a. Scan surrounding IP addresses b. Detect multiple SSL certificates. c. Using Trace command that echo the exact request and detect changes d. All the above 7. Automatic Spidering for web application might not give the expected benefit in all those cases EXCEPT: a. complicated Java Scripts or compiled client code like flash or java applet. b. the multilevel input validation techniques c. having a single URL usage for multiple action d. the absence of robot.txt file 8. information that should be documented in mapping phase are: a. pages’ information and Directory structure b. common file extension and content based on plugin c. cookies and query string and parameters. d. All the above 9. Connect each of the following tool name with common functionality it provides 1-Black widow a-Site structure 2-Dir buster b-De-compiler 3-JAD c-Row network connection 4-NetCat d-Mirror site 10. minimizing mapped information can be achieved through a. using absolute paths instead of relative ones b. increase the usage of path traversal whenever possible c. be sure to set execution permission to active on JavaScript folder otherwise none of your script will work d. Use different root folders for user and administrator Answers key 1 b 2 d 3 d 4 d 5 b 6 d 7 d 8 d 9 1d2a3b4c 10 d