Bubba has just accessed he preferred ecommerce web site and has spotted an item that he would like to
buy. Bubba considers the price a bit too steep. He looks at the source code of the webpage and decides to
save the page locally, so that he can modify the page variables. In the context of web application security,
what do you think Bubba has changes?
Take a look at the following attack on a Web Server using obstructed URL:
http://www.example.com/script.ext?template%2e%2e%2e%2e%2e%2f%2e%2f%65%74%63%2f %70%
61%73%73%77%64
The request is made up of:
%2e%2e%2f%2e%2e%2f%2e%2f% = ../../../
%65%74%63 = etc
%2f = /
%70%61%73%73%77%64 = passwd
How would you protect information systems from these attacks?
Kevin sends an email invite to Chris to visit a forum for security professionals. Chris clicks on the link in the
email message and is taken to a web based bulletin board. Unknown to Chris, certain functions are
executed on his local system under his privileges, which allow Kevin access to information used on the
BBS. However, no executables are downloaded and run on the local system. What would you term this
attack?
Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to
spawn an interactive shell and plans to deface the main web page. He first attempts to use the "echo"
command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page
and achieves no progress. Finally, he tries to overwrite it with another page in which also he remains
unsuccessful. What is the probable cause of Bill's problem?
Bob is a very security conscious computer user. He plans to test a site that is known to have malicious
applets, code, and more. Bob always make use of a basic Web Browser to perform such testing.
Which of the following web browser can adequately fill this purpose?
Clive has been hired to perform a Black-Box test by one of his clients.
How much information will Clive obtain from the client before commencing his test?