adplus-dvertising
frame-decoration

Question

Upon further inspection, Joe finds a series of thousands of requests to the same URL coming from a single IP address. Here are a few examples:

http://www.mycompany.com/servicestatus.php?serviceID=1
http://www.mycompany.com/servicestatus.php?serviceID=2
http://www.mycompany.com/servicestatus.php?serviceID=3
http://www.mycompany.com/servicestatus.php?serviceID=4
http://www.mycompany.com/servicestatus.php?serviceID=5
http://www.mycompany.com/servicestatus.php?serviceID=6

What type of vulnerability was the attacker likely trying to exploit?

a.

Insecure direct object reference

b.

File upload

c.

Unvalidated redirect

d.

Session hijacking

Answer: (a).Insecure direct object reference Explanation:The series of thousands of requests incrementing a variable indicates that the attacker was likely attempting to exploit an insecure direct object reference vulnerability.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Upon further inspection, Joe finds a series of thousands of requests to the same URL coming from a single IP address. Here are a few...

Similar Questions

Discover Related MCQs

Q. Joe’s adventures in web server log analysis are not yet complete. As he continues to review the logs, he finds the request:

http://www.mycompany.com/../../../etc/passwd

What type of attack was most likely attempted?

Q. What type of attack depends on the fact that users are often logged into many websites simultaneously in the same browser?

Q. What type of cross-site scripting attack would not be visible to a security professional inspecting the HTML source code in a browser?

Q. Which one of the following attacks is an example of a race condition exploitation?

Q. Tom is a software developer who creates code for sale to the public. He would like to assure his users that the code they receive actually came from him. What technique can he use to best provide this assurance?

Q. Which one of the following tools may be used to debug applications written on a Mac platform?

Q. Norm is performing a penetration test of a web application and would like to manipulate the input sent to the application before it leaves his browser. Which one of the following tools would assist him with this task?

Q. What control is most commonly used to secure access to API interfaces?

Q. Which one of the following is a debugging tool compatible with Linux systems?

Q. During a penetration test, Bonnie discovers in a web server log that the testers attempted to access the following URL:
http://www.mycompany.com/sortusers.php?file=C:\uploads\attack.exe

What type of attack did they most likely attempt?