Unformatted text preview: 4. If an attacker wishes to place a phising page on a website, what is a common vulnerability that can be exploited to successfully do this? 5. What could be the impact of a successful SQL injection? 6. What is the difference with a blind SQL injection attack from a normal SQL injection attack? 7. Why are stored XSS vulnerabilities a major risk factor for a web application? 8. What whould the following url being queued in your web logs be an indication of . ./. ./. ./. ./. ./. ./. ./. ./etc/passwd ”? 9. How would you ensure security between a web application and an SQL server? 10. What is a benefit to using a web application firewall (WAF)?...
View Full Document
- Fall '13
- Networking, sql injection attack