` into a search field on a web application. The subsequent results page immediately executes the script, and an alert box appears. The script is not stored on the server in any permanent way. What type of Cross-Site Scripting (XSS) vulnerability has been identified?","acceptedAnswer":{"@type":"Answer","text":"Reflected XSS"},"suggestedAnswer":[{"@type":"Answer","text":"This is a Reflected XSS attack because the malicious script was sent to the web server as part of the request (in the search query) and was then immediately 'reflected' back and executed in the victim's browser without being permanently stored."}]},{"@type":"Question","name":"A penetration tester needs to discover hidden directories and files on a web server by using a wordlist to brute-force common names. Which of the following command-line tools is specifically designed for this purpose and is known for its speed?","acceptedAnswer":{"@type":"Answer","text":"Gobuster"},"suggestedAnswer":[{"@type":"Answer","text":"Gobuster is a tool written in Go that is used to brute-force URIs (directories and files), DNS subdomains, and virtual host names on web servers. Nmap is for network scanning, Wireshark is for packet analysis, and Metasploit is an exploitation framework."}]},{"@type":"Question","name":"While testing a login form, a junior pentester enters `' OR 1=1 --` into the username field and a random string in the password field. They successfully bypass authentication and gain access to an account. This is a classic example of which vulnerability?","acceptedAnswer":{"@type":"Answer","text":"SQL Injection (SQLi)"},"suggestedAnswer":[{"@type":"Answer","text":"This is a classic SQL Injection (SQLi) attack. The injected string `' OR 1=1 --` modifies the backend SQL query so that the condition is always true, and the `--` comments out the rest of the query (like the password check), allowing the attacker to bypass authentication."}]},{"@type":"Question","name":"Within Burp Suite, which tool is primarily used to act as a man-in-the-middle, allowing a tester to intercept, view, and modify all HTTP/S requests and responses between their browser and the target application in real-time?","acceptedAnswer":{"@type":"Answer","text":"Proxy"},"suggestedAnswer":[{"@type":"Answer","text":"The Burp Proxy tool is the core of Burp Suite and functions as an intercepting web proxy. It allows the user to intercept and modify traffic passing in both directions between the browser and the target server. Intruder is for automated attacks, Repeater is for manually re-sending and modifying individual requests, and Decoder is for data encoding/decoding."}]},{"@type":"Question","name":"A tester discovers a URL `http://example.com/app/profile?view=user.php`. By changing the URL to `http://example.com/app/profile?view=../../../../etc/passwd`, the contents of the server's password file are displayed. Which vulnerability has been exploited?","acceptedAnswer":{"@type":"Answer","text":"Local File Inclusion (LFI)"},"suggestedAnswer":[{"@type":"Answer","text":"This is a Local File Inclusion (LFI) vulnerability, often combined with a Path Traversal attack. The `../` sequence is used to navigate up the directory structure to access and display a sensitive file that exists locally on the server."}]}]}
Free · Instant Results