-
Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites or gather personal information?
-
What is the technique where an attacker inserts SQL database commands into a data-input field of an order form used by a web-based application?
-
What tools allows you to detect vulnerabilities in web applications related with JavaScript?
-
What tool allows you to obtain data structures from websites?
-
What tool allows you to detect sql-injection-type vulnerabilities in web applications?
-
Which profile in the w3af tool performs a scan to identify the vulnerabilities with higher risk, such as SQL Injection and Cross-site scripting (XSS)?
-
Which is the main class in w3af API that contains all the methods and properties needed to enable plugins, establish the objective of an attack, and manage profiles?
-
What is the...





















































