Questions

  1. Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites or gather personal information?

  2. What is the technique where an attacker inserts SQL database commands into a data-input field of an order form used by a web-based application?

  3. What tools allows you to detect vulnerabilities in web applications related with JavaScript?

  4. What tool allows you to obtain data structures from websites?

  5. What tool allows you to detect sql-injection-type vulnerabilities in web applications?

  6. Which profile in the w3af tool performs a scan to identify the vulnerabilities with higher risk, such as SQL Injection and Cross-site scripting (XSS)?

  7. Which is the main class in w3af API that ...

Get Mastering Python for Networking and Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.