ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 292 - CS0-003 discussion

Report
Export

While reviewing the web server logs, a security analyst notices the following snippet:

.. \ .. / .. \ .. /boot.ini

Which of the following Is belng attempted?

A.
Directory traversal
Answers
A.
Directory traversal
B.
Remote file inclusion
Answers
B.
Remote file inclusion
C.
Cross-site scripting
Answers
C.
Cross-site scripting
D.
Remote code execution
Answers
D.
Remote code execution
E.
Enumeration of /etc/passwd
Answers
E.
Enumeration of /etc/passwd
Suggested answer: A

Explanation:

The snippet shows an attempt to access the boot.ini file, which is a configuration file for Windows operating systems. The ''... \ ... /'' pattern is used to navigate up the directory structure and reach the root directory, where the boot.ini file is located. This is a common technique for exploiting directory traversal vulnerabilities, which allow an attacker to access files and directories outside the intended web server path. The other options are not relevant for this purpose: remote file inclusion involves injecting a malicious file into a web application; cross-site scripting involves injecting malicious scripts into a web page; remote code execution involves executing arbitrary commands on a remote system; enumeration of /etc/passwd involves accessing the file that stores user information on Linux systems.

According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, one of the objectives for the exam is to ''use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities''. The book also covers the usage and syntax of web server logs, which record the requests and responses of web applications, in chapter 6. Specifically, it explains the meaning and function of each component in web server logs, such as the HTTP method, the URL, the status code, and the user agent1, page 244. It also discusses the common types and indicators of web-based attacks, such as directory traversal, which use special characters to manipulate the web server path1, page 251. Therefore, this is a reliable source to verify the answer to the question.

asked 02/10/2024
Jack de Cort
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first