Bubba has just accessed he preferred ecommerce web site and has spotted an item that he would like to
buy. Bubba considers the price a bit too steep. He looks at the source code of the webpage and decides to
save the page locally, so that he can modify the page variables. In the context of web application security,
what do you think Bubba has changes?
Real 353
EC-Council EC0-350 Exam
Take a look at the following attack on a Web Server using obstructed URL:
http://www.example.com/script.ext?template%2e%2e%2e%2e%2e%2f%2e%2f%65%74%63%2f %70%
61%73%73%77%64
The request is made up of:
%2e%2e%2f%2e%2e%2f%2e%2f% = ../../../
%65%74%63 = etc
%2f = /
%70%61%73%73%77%64 = passwd
How would you protect information systems from these attacks?
Kevin sends an email invite to Chris to visit a forum for security professionals. Chris clicks on the link in the
email message and is taken to a web based bulletin board. Unknown to Chris, certain functions are
executed on his local system under his privileges, which allow Kevin access to information used on the
BBS. However, no executables are downloaded and run on the local system. What would you term this
attack?
Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to
spawn an interactive shell and plans to deface the main web page. He first attempts to use the "echo"
command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page
and achieves no progress. Finally, he tries to overwrite it with another page in which also he remains
unsuccessful. What is the probable cause of Bill's problem?
Bob is a very security conscious computer user. He plans to test a site that is known to have malicious
applets, code, and more. Bob always make use of a basic Web Browser to perform such testing.
Which of the following web browser can adequately fill this purpose?
Clive has been hired to perform a Black-Box test by one of his clients.
How much information will Clive obtain from the client before commencing his test?
Scanning for services is an easy job for Bob as there are so many tools available from the Internet. In order
for him to check the vulnerability of XYZ, he went through a few scanners that are currently available. Here
are the scanners that he uses:
1. Axent's NetRecon (http://www.axent.com)
2. SARA, by Advanced Research Organization (http://www-arc.com/sara)
3. VLAD the Scanner, by Razor (http://razor.bindview.com/tools/)
However, there are many other alternative ways to make sure that the services that have been scanned will
be more accurate and detailed for Bob.
Real 357
EC-Council EC0-350 Exam
What would be the best method to accurately identify the services running on a victim host?