Deck 3: Application and Network Attacks

ملء الشاشة (f)
exit full mode
سؤال
The SQL injection statement ____ erases the database table.

A) whatever'; DROP TABLE members; --
B) whatever'; DELETE TABLE members; --
C) whatever'; UPDATE TABLE members; --
D) whatever'; RENAME TABLE members; --
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The SQL injection statement ____ discovers the name of a table.

A) whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); --
B) whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
C) whatever; AND 1=(SELECT COUNT(*) FROM tabname); --
D) whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --
سؤال
Users who access a Web server are usually restricted to the ____ directory.

A) top
B) base
C) root
D) tap
سؤال
ARP poisoning is successful because there are few authentication procedures to verify ARP requests and replies.
سؤال
____ is a language used to view and manipulate data that is stored in a relational database.

A) C
B) DQL
C) SQL
D) ISL
سؤال
A client-side attack that results in a user's computer becoming compromised just by viewing a Web page and not even clicking any content is known as a ____.

A) buffer overflow
B) drive-by-download
C) denial of service
D) stack underflow
سؤال
____ is designed to display data, with the primary focus on how the data looks.

A) XML
B) HTML
C) SGML
D) ISL
سؤال
____ is for the transport and storage of data, with the focus on what the data is.

A) XML
B) HTML
C) SGML
D) SML
سؤال
Because the XSS is a widely known attack, the number of Web sites that are vulnerable is very small.
سؤال
The "omnipresence" of access from any computer with only an Internet connection and a Web browser has made Web applications an essential element of organizations today.
سؤال
The expression ____ up one directory level.

A) ;/traverses
B)./traverses
C) %20/traverses
D)../ traverses
سؤال
For a Web server's Linux system, the default root directory is typically ____.

A) /var/www
B) C:\inetpub\wwwroot
C) /var/root
D) /home/root
سؤال
The SQL injection statement ____ determines the names of different fields in a database.

A) whatever AND email IS NULL; --
B) whatever; AND email IS NULL; --
C) whatever" AND email IS NULL; --
D) whatever' AND email IS NULL; --
سؤال
HTML is a markup language that uses specific ____ embedded in brackets.

A) blocks
B) marks
C) taps
D) tags
سؤال
Although traditional network security devices can block traditional network attacks, they cannot always block Web application attacks.
سؤال
Because of the minor role it plays, DNS is never the focus of attacks.
سؤال
The ____ is part of an HTTP packet that is composed of fields that contain the different characteristics of the data being transmitted.

A) HTTP header
B) HTML header
C) XML header
D) SSL header
سؤال
The SQL injection statement ____ finds specific users.

A) whatever' OR full_name = '%Mia%'
B) whatever' OR full_name IS '%Mia%'
C) whatever' OR full_name LIKE '%Mia%'
D) whatever' OR full_name equals '%Mia%'
سؤال
The default root directory of the Microsoft Internet Information Services (IIS) Web server is ____.

A) /var/www
B) C:\Inetpub\ wwwroot
C) /var/html
D) /etc/var/www
سؤال
Web application attacks are considered ____ attacks.

A) client-side
B) hybrid
C) server-side
D) relationship
سؤال
Why would you want to limit access to the root directory of a Web server?
سؤال
When TCP/IP was developed, the host table concept was expanded to a hierarchical name system for matching computer names and numbers known as the ____.

A) HTTP
B) NSDB
C) URNS
D) DNS
سؤال
The ____________________ directory is a specific directory on a Web server's file system.
سؤال
List three of the most common Web application attacks.
سؤال
A(n) ____________________ cookie is stored in Random Access Memory (RAM), instead of on the hard drive, and only lasts for the duration of visiting the Web site.
سؤال
Describe how to harden a Web server.
سؤال
____ substitutes DNS addresses so that the computer is automatically redirected to another device.

A) DNS poisoning
B) Phishing
C) DNS marking
D) DNS overloading
سؤال
A ____ attack is similar to a passive man-in-the-middle attack.

A) replay
B) hijacking
C) denial
D) buffer overflow
سؤال
Describe a cross-site scripting (XSS) attack.
سؤال
All Web traffic is based on the ____________________ protocol.
سؤال
____ is an attack in which an attacker attempts to impersonate the user by using his session token.

A) Session replay
B) Session spoofing
C) Session hijacking
D) Session blocking
سؤال
When DNS servers exchange information among themselves it is known as a ____.

A) resource request
B) zone disarticulation
C) zone transfer
D) zone removal
سؤال
The predecessor to today's Internet was a network known as ____________________.
سؤال
What does a user need to perform a directory traversal attack?
سؤال
Describe a drive-by-download attack.
سؤال
A(n) ____________________ is a method for adding annotations to the text so that the additions can be distinguished from the text itself.
سؤال
The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.

A) DNS spooking
B) DNS poisoning
C) DNS bonding
D) DNS blacklisting
سؤال
Explain the HTTP header referrer attack.
سؤال
Describe the differences between XML and HTML.
سؤال
Describe the two types of privilege escalation.
سؤال
Explain the approach attackers use against DNS servers.
سؤال
Match between columns
Created from the Web site that a user is currently viewing
Zero day attack
Created from the Web site that a user is currently viewing
Cross-site scripting (XSS) attack
Created from the Web site that a user is currently viewing
Directory traversal attack
Created from the Web site that a user is currently viewing
Command injection
Created from the Web site that a user is currently viewing
Client-side attack
Created from the Web site that a user is currently viewing
First-party cookie
Created from the Web site that a user is currently viewing
Access rights
Created from the Web site that a user is currently viewing
Privilege escalation
Created from the Web site that a user is currently viewing
Transitive access
Privileges that are granted to users to access hardware and software resources
Zero day attack
Privileges that are granted to users to access hardware and software resources
Cross-site scripting (XSS) attack
Privileges that are granted to users to access hardware and software resources
Directory traversal attack
Privileges that are granted to users to access hardware and software resources
Command injection
Privileges that are granted to users to access hardware and software resources
Client-side attack
Privileges that are granted to users to access hardware and software resources
First-party cookie
Privileges that are granted to users to access hardware and software resources
Access rights
Privileges that are granted to users to access hardware and software resources
Privilege escalation
Privileges that are granted to users to access hardware and software resources
Transitive access
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Zero day attack
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Cross-site scripting (XSS) attack
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Directory traversal attack
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Command injection
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Client-side attack
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
First-party cookie
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Access rights
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Privilege escalation
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Transitive access
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Zero day attack
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Cross-site scripting (XSS) attack
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Directory traversal attack
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Command injection
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Client-side attack
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
First-party cookie
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Access rights
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Privilege escalation
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Transitive access
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Zero day attack
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Cross-site scripting (XSS) attack
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Directory traversal attack
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Command injection
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Client-side attack
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
First-party cookie
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Access rights
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Privilege escalation
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Transitive access
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Zero day attack
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Cross-site scripting (XSS) attack
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Directory traversal attack
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Command injection
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Client-side attack
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
First-party cookie
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Access rights
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Privilege escalation
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Transitive access
An attack involving using a third party to gain access rights.
Zero day attack
An attack involving using a third party to gain access rights.
Cross-site scripting (XSS) attack
An attack involving using a third party to gain access rights.
Directory traversal attack
An attack involving using a third party to gain access rights.
Command injection
An attack involving using a third party to gain access rights.
Client-side attack
An attack involving using a third party to gain access rights.
First-party cookie
An attack involving using a third party to gain access rights.
Access rights
An attack involving using a third party to gain access rights.
Privilege escalation
An attack involving using a third party to gain access rights.
Transitive access
Injects scripts into a Web application server that will then direct attacks at clients
Zero day attack
Injects scripts into a Web application server that will then direct attacks at clients
Cross-site scripting (XSS) attack
Injects scripts into a Web application server that will then direct attacks at clients
Directory traversal attack
Injects scripts into a Web application server that will then direct attacks at clients
Command injection
Injects scripts into a Web application server that will then direct attacks at clients
Client-side attack
Injects scripts into a Web application server that will then direct attacks at clients
First-party cookie
Injects scripts into a Web application server that will then direct attacks at clients
Access rights
Injects scripts into a Web application server that will then direct attacks at clients
Privilege escalation
Injects scripts into a Web application server that will then direct attacks at clients
Transitive access
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Zero day attack
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Cross-site scripting (XSS) attack
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Directory traversal attack
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Command injection
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Client-side attack
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
First-party cookie
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Access rights
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Privilege escalation
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Transitive access
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Application and Network Attacks
1
The SQL injection statement ____ erases the database table.

A) whatever'; DROP TABLE members; --
B) whatever'; DELETE TABLE members; --
C) whatever'; UPDATE TABLE members; --
D) whatever'; RENAME TABLE members; --
A
2
The SQL injection statement ____ discovers the name of a table.

A) whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); --
B) whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
C) whatever; AND 1=(SELECT COUNT(*) FROM tabname); --
D) whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --
B
3
Users who access a Web server are usually restricted to the ____ directory.

A) top
B) base
C) root
D) tap
C
4
ARP poisoning is successful because there are few authentication procedures to verify ARP requests and replies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ is a language used to view and manipulate data that is stored in a relational database.

A) C
B) DQL
C) SQL
D) ISL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
A client-side attack that results in a user's computer becoming compromised just by viewing a Web page and not even clicking any content is known as a ____.

A) buffer overflow
B) drive-by-download
C) denial of service
D) stack underflow
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ is designed to display data, with the primary focus on how the data looks.

A) XML
B) HTML
C) SGML
D) ISL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ is for the transport and storage of data, with the focus on what the data is.

A) XML
B) HTML
C) SGML
D) SML
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Because the XSS is a widely known attack, the number of Web sites that are vulnerable is very small.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
The "omnipresence" of access from any computer with only an Internet connection and a Web browser has made Web applications an essential element of organizations today.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
The expression ____ up one directory level.

A) ;/traverses
B)./traverses
C) %20/traverses
D)../ traverses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
For a Web server's Linux system, the default root directory is typically ____.

A) /var/www
B) C:\inetpub\wwwroot
C) /var/root
D) /home/root
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
The SQL injection statement ____ determines the names of different fields in a database.

A) whatever AND email IS NULL; --
B) whatever; AND email IS NULL; --
C) whatever" AND email IS NULL; --
D) whatever' AND email IS NULL; --
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
HTML is a markup language that uses specific ____ embedded in brackets.

A) blocks
B) marks
C) taps
D) tags
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
Although traditional network security devices can block traditional network attacks, they cannot always block Web application attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Because of the minor role it plays, DNS is never the focus of attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
The ____ is part of an HTTP packet that is composed of fields that contain the different characteristics of the data being transmitted.

A) HTTP header
B) HTML header
C) XML header
D) SSL header
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
The SQL injection statement ____ finds specific users.

A) whatever' OR full_name = '%Mia%'
B) whatever' OR full_name IS '%Mia%'
C) whatever' OR full_name LIKE '%Mia%'
D) whatever' OR full_name equals '%Mia%'
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
The default root directory of the Microsoft Internet Information Services (IIS) Web server is ____.

A) /var/www
B) C:\Inetpub\ wwwroot
C) /var/html
D) /etc/var/www
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Web application attacks are considered ____ attacks.

A) client-side
B) hybrid
C) server-side
D) relationship
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Why would you want to limit access to the root directory of a Web server?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
When TCP/IP was developed, the host table concept was expanded to a hierarchical name system for matching computer names and numbers known as the ____.

A) HTTP
B) NSDB
C) URNS
D) DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
The ____________________ directory is a specific directory on a Web server's file system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
List three of the most common Web application attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____________________ cookie is stored in Random Access Memory (RAM), instead of on the hard drive, and only lasts for the duration of visiting the Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe how to harden a Web server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
____ substitutes DNS addresses so that the computer is automatically redirected to another device.

A) DNS poisoning
B) Phishing
C) DNS marking
D) DNS overloading
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
A ____ attack is similar to a passive man-in-the-middle attack.

A) replay
B) hijacking
C) denial
D) buffer overflow
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Describe a cross-site scripting (XSS) attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
All Web traffic is based on the ____________________ protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
____ is an attack in which an attacker attempts to impersonate the user by using his session token.

A) Session replay
B) Session spoofing
C) Session hijacking
D) Session blocking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
When DNS servers exchange information among themselves it is known as a ____.

A) resource request
B) zone disarticulation
C) zone transfer
D) zone removal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
The predecessor to today's Internet was a network known as ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
What does a user need to perform a directory traversal attack?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
Describe a drive-by-download attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
A(n) ____________________ is a method for adding annotations to the text so that the additions can be distinguished from the text itself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.

A) DNS spooking
B) DNS poisoning
C) DNS bonding
D) DNS blacklisting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Explain the HTTP header referrer attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Describe the differences between XML and HTML.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Describe the two types of privilege escalation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Explain the approach attackers use against DNS servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
Created from the Web site that a user is currently viewing
Zero day attack
Created from the Web site that a user is currently viewing
Cross-site scripting (XSS) attack
Created from the Web site that a user is currently viewing
Directory traversal attack
Created from the Web site that a user is currently viewing
Command injection
Created from the Web site that a user is currently viewing
Client-side attack
Created from the Web site that a user is currently viewing
First-party cookie
Created from the Web site that a user is currently viewing
Access rights
Created from the Web site that a user is currently viewing
Privilege escalation
Created from the Web site that a user is currently viewing
Transitive access
Privileges that are granted to users to access hardware and software resources
Zero day attack
Privileges that are granted to users to access hardware and software resources
Cross-site scripting (XSS) attack
Privileges that are granted to users to access hardware and software resources
Directory traversal attack
Privileges that are granted to users to access hardware and software resources
Command injection
Privileges that are granted to users to access hardware and software resources
Client-side attack
Privileges that are granted to users to access hardware and software resources
First-party cookie
Privileges that are granted to users to access hardware and software resources
Access rights
Privileges that are granted to users to access hardware and software resources
Privilege escalation
Privileges that are granted to users to access hardware and software resources
Transitive access
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Zero day attack
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Cross-site scripting (XSS) attack
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Directory traversal attack
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Command injection
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Client-side attack
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
First-party cookie
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Access rights
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Privilege escalation
Exploits previously unknown vulnerabilities so victims have no time to prepare or defend against the attacks.
Transitive access
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Zero day attack
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Cross-site scripting (XSS) attack
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Directory traversal attack
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Command injection
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Client-side attack
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
First-party cookie
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Access rights
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Privilege escalation
Takes advantage of vulnerability in the Web application program or the Web server software so that a user can move from the root directory to other restricted directories
Transitive access
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Zero day attack
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Cross-site scripting (XSS) attack
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Directory traversal attack
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Command injection
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Client-side attack
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
First-party cookie
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Access rights
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Privilege escalation
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data
Transitive access
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Zero day attack
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Cross-site scripting (XSS) attack
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Directory traversal attack
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Command injection
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Client-side attack
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
First-party cookie
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Access rights
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Privilege escalation
The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server
Transitive access
An attack involving using a third party to gain access rights.
Zero day attack
An attack involving using a third party to gain access rights.
Cross-site scripting (XSS) attack
An attack involving using a third party to gain access rights.
Directory traversal attack
An attack involving using a third party to gain access rights.
Command injection
An attack involving using a third party to gain access rights.
Client-side attack
An attack involving using a third party to gain access rights.
First-party cookie
An attack involving using a third party to gain access rights.
Access rights
An attack involving using a third party to gain access rights.
Privilege escalation
An attack involving using a third party to gain access rights.
Transitive access
Injects scripts into a Web application server that will then direct attacks at clients
Zero day attack
Injects scripts into a Web application server that will then direct attacks at clients
Cross-site scripting (XSS) attack
Injects scripts into a Web application server that will then direct attacks at clients
Directory traversal attack
Injects scripts into a Web application server that will then direct attacks at clients
Command injection
Injects scripts into a Web application server that will then direct attacks at clients
Client-side attack
Injects scripts into a Web application server that will then direct attacks at clients
First-party cookie
Injects scripts into a Web application server that will then direct attacks at clients
Access rights
Injects scripts into a Web application server that will then direct attacks at clients
Privilege escalation
Injects scripts into a Web application server that will then direct attacks at clients
Transitive access
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Zero day attack
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Cross-site scripting (XSS) attack
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Directory traversal attack
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Command injection
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Client-side attack
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
First-party cookie
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Access rights
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Privilege escalation
Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining
Transitive access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.