Web App Threats:
_____ is a Top 10 list of all computer related stuff.
OWASP
Web App Threats:
Directory Traversal
Web App Threats:
It is a type of unvalidated redirect attack where the attacker first identifies the most visited website of the target identifies the vulnerabilities in the website, injects malicious code into the vulnerability web application, and waits for the victim to browse the website. Once the victim tries to access the website, the malicious code executes infecting the victim.
a. Water Hole Attack
b. Cross-Site Request Forgery (CRSF)
c. Cookie Poisoning
d. Cross-Site Scripting (XSS)
a. Water Hole Atack
Web App Threats:
c. Cookie Poisoning
Hacking Methodology:
What can you do to defend against: Supply crafted malicious input that is syntactically correct according to the interpreted language being used in order to break application’s normal intended.
Input Validation
Hacking Methodology:
What can you do to mitigate SQL Injections?
Input Validation