Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter’s material. You will find the answers in the Assessments section of the Appendix:
- What type of vulnerability is an attack that injects malicious scripts into web pages to redirect users to fake websites or to gather personal information?
- What is the technique where an attacker inserts SQL database commands into a data input field of the order form used by a web-based application?
- Which sqlmap option allows getting an interactive shell to interact with the database?
- What is the name of the Nmap script that allows scanning for the SQL injection in a web application?
- What techniques do the Oralyzer and Fuxploider tools use to detect vulnerabilities in web applications?