|
Question |
Rating |
View Answer |
|
You have been asked to review the source code for a compiled script that is being used to validate logon credentials for a web application. The file is called "logon_validate" and a typical logon request looks like this - |
|
View Answer |
|
What do you see as challenges to successfully deploying/monitoring web intrusion detection? |
|
View Answer |
|
If you were not using Apache as the reverse proxy, what Microsoft application/tool could you use to mitigate this attack? |
|
View Answer |
|
Why we use firewall for security when we have facilities like access-list on routers ? |
|
View Answer |
|
What application generated the log file entry below? What type of attack is this? Assuming the index.php program is vulnerable, was this attack successful?
|
|
View Answer |
|
What online resources do you use to keep abreast of web security issues? Can you give an example of a recent web security vulnerability or threat? |
|
View Answer |
|
What are some examples of you how you would attempt to gain access? |
|
View Answer |
|
What does this log entry indicate? How could you identify what the contents are of the "hacked.htm" file that the attacker is trying to upload?
|
|
View Answer |
|
What are the most important steps you would recommend for securing a new web server? Web application? |
|
View Answer |
|
What is your definition of the term "Cross-Site Scripting"? What is the potential impact to servers and clients?
|
|
View Answer |
|
One of your web servers is logging multiple requests similar to the following:
|
|
View Answer |
|
What do you see as the most critical and current threats effecting Internet accessible websites? |
|
View Answer |