Common Vulnerabilities: SQL Injection and Cross-Site Scripting Quiz
30 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of port scanning?

  • To verify the security policy of a server or host
  • To identify running services on a host
  • To find active ports on a server or host
  • All of the above (correct)
  • Which port is used for the Hypertext Transfer Protocol (HTTP)?

  • 80 (correct)
  • 443
  • 21
  • 22
  • What is the purpose of a 'close port'?

  • The host sends a reply indicating the port is open
  • The host does not reply, indicating the port is filtered
  • The host sends a reply indicating the connection will be denied (correct)
  • The host sends a reply indicating the port is active
  • What type of port is used for the File Transfer Protocol (FTP) data transfer?

    <p>20</p> Signup and view all the answers

    Which protocol uses port 22 for secure login?

    <p>Secure Shell (SSH)</p> Signup and view all the answers

    What is the purpose of a 'filtered port'?

    <p>The host does not reply, indicating the port is filtered</p> Signup and view all the answers

    How can SQL injection be prevented?

    <p>Using parameterized queries</p> Signup and view all the answers

    What is the main risk associated with Cross-Site Scripting (XSS)?

    <p>Theft of sensitive information</p> Signup and view all the answers

    How does CSRF attack work?

    <p>Causing a user's browser to perform unwanted actions on trusted sites</p> Signup and view all the answers

    What is the consequence of Buffer Overflow?

    <p>Potential code execution by an attacker</p> Signup and view all the answers

    How can Security Misconfigurations be avoided?

    <p>Using secure coding practices</p> Signup and view all the answers

    What is the recommended method to prevent SQL injection?

    <p>Implementing input validation</p> Signup and view all the answers

    What is the main purpose of the 'socat' command?

    <p>To connect stdio to a remote TCP port</p> Signup and view all the answers

    What is the purpose of a port redirection tool?

    <p>To route traffic between two different ports</p> Signup and view all the answers

    Which of the following is a Unix-based port redirection tool mentioned in the text?

    <p>datapipe</p> Signup and view all the answers

    What does the 'localhost' argument represent in the 'datapipe' command?

    <p>The IP address on which to open the listening port</p> Signup and view all the answers

    How is data transmitted when using the 'socat' command?

    <p>Data is piped into the command and forwarded to the remote host</p> Signup and view all the answers

    What is the purpose of using a port redirection tool between a browser and a web server?

    <p>To allow the browser to access the web server without knowing its IP address</p> Signup and view all the answers

    What is the purpose of the localport argument in the given context?

    <p>It specifies the port number on the local system to listen for incoming connections.</p> Signup and view all the answers

    Why might you receive a "bind: Permission denied" error when opening a listening port below 1024 on UNIX systems?

    <p>Your account does not have the required privileges to open reserved ports.</p> Signup and view all the answers

    What is the typical value for the remoteport argument when forwarding traffic to a web server?

    <p>80</p> Signup and view all the answers

    What does the remotehost argument represent in the context of port redirection?

    <p>The hostname or IP address of the target system to which traffic is forwarded.</p> Signup and view all the answers

    What is the purpose of the datapipe tool mentioned in the text?

    <p>It forwards traffic between TCP ports without modifying the data.</p> Signup and view all the answers

    What is a key difference between datapipe and FPipe mentioned in the text?

    <p><code>FPipe</code> supports both TCP and UDP protocols, while <code>datapipe</code> only supports TCP.</p> Signup and view all the answers

    What tool in the Nmap suite is used for comparing scan results?

    <p>Ndiff</p> Signup and view all the answers

    Which movie featured Nmap among its tools?

    <p>The Matrix Reloaded</p> Signup and view all the answers

    What does Amap aim to identify?

    <p>Applications on non-standard ports</p> Signup and view all the answers

    In which mode of THC - Amap does it not perform service identification?

    <p>-B</p> Signup and view all the answers

    What characteristic is NOT attributed to NMAP in the text?

    <p>Expensive</p> Signup and view all the answers

    Which tool in the Nmap suite focuses on packet generation and response analysis?

    <p>Nping</p> Signup and view all the answers

    Study Notes

    Ports and Protocols

    • Ephemeral ports: a range of ports allocated by a web browser when connecting to a web server
    • Well-known ports:
      • 20: FTP (File Transfer Protocol) data transfer
      • 21: FTP command control
      • 22: SSH (Secure Shell) secure login
      • 23: Telnet remote login service
      • 25: SMTP (Simple Mail Transfer Protocol) email routing
      • 53: DNS (Domain Name System) service
      • 67, 68: DHCP (Dynamic Host Configuration Protocol)
      • 80: HTTP (Hypertext Transfer Protocol) used in the World Wide Web
      • 110: POP3 (Post Office Protocol version 3) email retrieval
      • 119: NNTP (Network News Transfer Protocol)
      • 123: NTP (Network Time Protocol)
      • 143: IMAP (Internet Message Access Protocol) email retrieval
      • 161: SNMP (Simple Network Management Protocol)
      • 194: IRC (Internet Relay Chat)
      • 443: HTTPS (HTTP over TLS/SSL) secure web browsing

    Port Scanning

    • Port scanner: software designed to probe a server or host for open ports
    • Port scan: a process that sends a client request to a server to find active ports
    • Open port: a port that responds to a request, indicating it is active
    • Closed port: a port that does not respond to a request, indicating it is inactive
    • Filtered port: a port that does not respond to a request, but may be active
    • Vulnerabilities: open ports or operating system vulnerabilities can be exploited by attackers

    Vulnerabilities and Prevention

    • SQL Injection (SQLi):
      • Description: injecting malicious SQL statements to gain unauthorized access to a database
      • Prevention: use parameterized queries, input validation, and least privilege principles
    • Cross-Site Scripting (XSS):
      • Description: injecting malicious scripts into web pages to steal sensitive information or hijack sessions
      • Prevention: input validation, output encoding, and secure coding practices
    • Cross-Site Request Forgery (CSRF):
      • Description: tricking a user into performing unwanted actions on a trusted site
      • Prevention: use anti-CSRF tokens, same-site attribute for cookies, and proper authentication
    • Buffer Overflow:
      • Description: exploiting a program's buffer overflow to execute malicious code
      • Prevention: bounds checking, input validation, and secure coding practices
    • Security Misconfigurations:
      • Description: improper configuration of settings, permissions, or defaults that expose sensitive information or provide unauthorized access

    Port Redirection Tools

    • Datapipe:
      • A Unix-based port redirection tool
      • Functions as a channel for TCP/IP connections
      • Redirects traffic from one port to another
      • Example usage: $ ./datapipe localhost localport remotehost remoteport
    • FPipe:
      • A Windows-based port redirection tool
      • Adds UDP protocol and outbound source port number support
    • Nmap:
      • A flexible data transfer, redirection, and debugging tool
      • Part of the Nmap suite
    • THC-Amap:
      • A next-generation scanning tool for pentesters
      • Attempts to identify applications even if running on a different port
      • Identifies non-ASCII based applications
      • Modes:
        • -A: identifies the service associated with the port
        • -B: does not perform identification
        • -P: conducts a port scan

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on common vulnerabilities including SQL Injection and Cross-Site Scripting. Learn about code injection techniques, prevention methods such as parameterized queries, and the risks involved in injecting malicious scripts into web pages.

    More Like This

    Use Quizgecko on...
    Browser
    Browser