KARIM ASHRAF SPACE.
  • Who Am I ?
  • WRITEUPS
    • What about Practice in Cyber Security?
    • Dark Side of VSCode
    • What about Cy-nix Machine?
    • Cyberdefenders Labs
      • Web Investigation Blue Team Lab
      • Red Stealer Blue Team Lab
      • WebStrike Blue Team Lab
      • BlueSky Ransomware Blue Team Lab
      • PsExec Hunt Blue Team Lab
      • OpenWire Blue Team Lab
      • 3CX Supply Chain Blue Team Lab
      • PoisonedCredentials Lab
      • Reveal Lab
    • Lets Defend
      • Incident Responder Path
        • Cybersecurity Incident Handling Guide
          • Introduction to Incident Handling
          • Incident Handling Steps
          • Preparation
          • Detection and Analysis
          • Containment, Eradication, and Recovery
          • Post-Incident Activity
        • Incident Response on Windows
          • How to Create Incident Response Plan?
          • Incident Response Procedure
          • 3 Important Things
          • Free Tools That Can Be Used
          • Live Memory Analysis
          • Task Scheduler
          • Services
          • Registry Run Keys / Startup Folder
          • Files
          • Checklist
        • Incident Response on Linux
          • How to Create Incident Response Plan?
          • Incident Response Procedure
          • 3 Important Things
          • Users and Groups
          • Processes
          • Files and File System
          • Mounts
          • Network
          • Service
          • Cron Job
          • SSH Authorized Keys
          • Bash_rc & Bash_profile
          • Useful Log Files
        • Hacked Web Server Analysis
          • Introduction to Hacked Web Server Analysis
          • Log Analysis on Web Servers
          • Attacks on Web Servers
          • Attacks Against Web Applications
          • Vulnerabilities on Servers
          • Vulnerabilities in Programming Language
          • Discovering the Web Shell
          • Hacked Web Server Analysis Example
        • Log Analysis with Sysmon
          • Introduction and Set Up of Sysmon
          • Detecting Mimikatz with Sysmon
          • Detecting Pass The Hash with Sysmon
          • Detecting Privilege Escalation with Sysmon
        • Forensic Acquisition and Triage
          • Introduction to Forensics Acquisition and Triage
          • Acquiring Memory Image From Windows and Linux
          • Custom Image Using FTK and Mounting Image for Analysis
          • KAPE Targets for Acquisition
          • KAPE Modules for Triage and Analysis
          • Triage Using FireEye Redline
          • Acquisition and Triage of Disks Using Autopsy
        • Memory Forensics
          • What is Memory Forensics
          • Memory Analysis Procedures
        • Registry Forensics
          • Introduction to Windows Registry Forensics
          • Acquiring Registry Hives
          • Regedit and Registry Explorer
          • System, Users and Network Information
          • Shellbags
          • Shimcache
          • Amcache
          • Recent Files
          • Dialogue Boxes MRU
        • Event Log Analysis
          • Introduction to Event Logs
          • Event Log Analysis
          • Authentication Event Logs
          • Windows Scheduled Tasks Event Logs
          • Windows Services Event Logs
          • Account Management Events
          • Event Log Manipulation
          • Windows Firewall Event Logs
          • Windows Defender Event Logs
          • Powershell Command Execution Event logs
        • Browser Forensics
          • Introduction to Browser Forensics
          • Acquisition
          • Browser Artifacts
          • Tool: BrowsingHistoryView
          • Manual Browser Analysis
          • Hindsight Framework
        • GTFOBins
          • Introduction to GTFOBins
          • Shell
          • Command
          • Reverse Shell
          • Bind Shell
          • File Upload
          • File Download
          • Sudo
        • Hunting AD Attacks
          • Introduction to Active Directory
          • Hunting AS-REP Roasting Attack
          • Hunting for Kerberoasting Attacks
          • Hunting for LDAP Enumerations (Bloodhound_Sharphound)
          • Hunting for NTDS Database Dumping
          • Hunting for Golden Ticket Attacks
          • Hunting for NTLM Relay Attacks
        • Writing a Report on Security Incident
          • Introduction to Technical Writing
          • Reporting Standards
          • Reporting Style
          • Report Formatting
          • Report Templates
        • How to Prepare a Cyber Crisis Management Pla
          • Introduction to Crisis Management
          • General Preparation
          • Tools
          • Backups
          • Alerts and End of Crisis
        • Advanced Event Log Analysis
          • Process Creation
          • DNS Activity
          • File/Folder Monitoring
          • BITS Client Event Log
          • Network Connections Event Log
          • MSI Event Logs
        • USB Forensics
          • Introduction to USB Forensics
          • USB Registry Key
          • USB Event Logs
          • Folder Access Analysis via Shellbags
          • File Access Analysis via Jumplists
          • Automated USB Parsers Tools
        • Windows Disk Forensics
          • SRUM Database
          • Jumplists
          • Recycle Bin Artifacts
          • RDP Cache
          • Thumbnail Cache
    • BTLO LABS
      • Bruteforce BTLO
    • The Complete Active Directory Security Handbook
      • Introduction
      • Active Directory
      • Attack Technique 1: Pass the Hash: Use of Alternate Authentication Material (T1550)
      • Attack Technique 2: Pass the Ticket: Use of Alternate Authentication Material (T1550)
      • Attack Technique 3: Kerberoasting
      • Attack Technique 4: Golden Ticket Attack
      • Attack Technique 5: DCShadow Attack
      • Attack Technique 6: AS-REP Roasting
      • Attack Technique 7: LDAP Injection Attack
      • Attack Technique 8: PetitPotam NTLM Relay Attack on a Active Directory Certificate Services (AD CS)
      • Conclusion & References
    • Windows Privilege Escalation
      • Tools
      • Windows Version and Configuration
      • User Enumeration
      • Network Enumeration
      • Antivirus Enumeration
      • Default Writeable Folders
      • EoP - Looting for passwords
      • EoP - Incorrect permissions in services
      • EoP - Windows Subsystem for Linux (WSL)
      • EoP - Unquoted Service Paths
      • EoP - $PATH Interception
      • EoP - Named Pipes
      • EoP - Kernel Exploitation
      • EoP - AlwaysInstallElevated
      • EoP - Insecure GUI apps
      • EoP - Evaluating Vulnerable Drivers
      • EoP - Printers
      • EoP - Runas
      • EoP - Abusing Shadow Copies
      • EoP - From local administrator to NT SYSTEM
      • EoP - Living Off The Land Binaries and Scripts
      • EoP - Impersonation Privileges
      • EoP - Privileged File Write
      • References
      • Practical Labs
    • Advanced Log Analysis
      • Key Windows Event IDs for Cybersecurity Monitoring
      • Analyzing a Series of Failed Login Attempts from Multiple IP Addresses
      • Steps to Investigate Suspicious Outbound Network Traffic
      • Identifying and Responding to Lateral Movement within a Network
      • Distinguishing Between Legitimate and Malicious PowerShell Executions
      • Detecting and Analyzing a Potential Data Exfiltration Incident Using Log Data
      • Steps to Analyze PowerShell Logging (Event ID 4104) for Malicious Activity
      • How to Identify an Internal Pivot Attack Using Log Data
      • Indicators in Logs Suggesting a Privilege Escalation Attack
      • How to Detect Command and Control (C2) Communication Using Log Analysis
      • How to Analyze Logs to Detect a Brute-Force Attack on an RDP Service
      • How to Analyze Logs to Detect a Brute-Force Attack on an RDP Service
      • How to Detect the Use of Living-Off-the-Land Binaries (LOLBins) in Logs
      • How to Detect Malware Masquerading as a Legitimate Process Using Log Analysis
      • How to Detect and Analyze Lateral Movement Using Windows Event Logs
      • How to Detect Potential Ransomware Attacks in Their Early Stages Using Log Analysis
      • How to Detect and Analyze Privilege Escalation Using Windows Event Logs
      • How to Detect the Use of Mimikatz or Similar Tools in Log Data
      • How to Detect and Analyze DNS Tunneling Through Log Analysis
      • How to Detect a Pass-the-Hash (PtH) Attack Using Logs
      • How to Detect and Analyze an Attacker’s Use of a Remote Access Trojan (RAT) Using Log Data
      • How to Detect Lateral Movement Using Windows Event Logs
      • How to Detect and Investigate Data Exfiltration Using Logs
      • How to Identify and Analyze an Internal Phishing Campaign Using Email and System Logs
      • How to Detect and Analyze Ransomware Activity Using Logs
      • How to Detect Malicious PowerShell Activity Using Log Analysis
      • How to Detect and Respond to Brute-Force Attacks Using Log Data
      • How to Detect Privilege Escalation Attempts Using Windows Event Logs
      • How to Detect and Analyze Suspicious Domain Name Resolution Requests in DNS Logs
      • How to Detect and Respond to Unauthorized Access to Critical Files
      • How to Detect and Analyze Suspicious PowerShell Command Execution
      • How to Detect and Investigate Account Takeover (ATO) Attempts Using
      • How to Detect and Analyze the Use of Living Off the Land Binaries (LOLBins)
      • How to Detect and Investigate Lateral Movement
      • How to Detect and Investigate Data Exfiltration
      • How to Detect and Analyze Suspicious Activity Involving Service Accounts
      • How to Detect and Investigate Anomalous PowerShell Activity Related to Credential Dumping
      • How to Detect and Analyze the Execution of Unsigned or Malicious Executables
      • How to Detect and Investigate Abnormal Spikes in Network Traffic
    • Methods for Stealing Password in Browser
      • Important Tables and Columns
      • Important Queries
      • Profiles
      • Tools
        • HackBrowserData
        • Browser-password-stealer
        • BrowserPass
        • WebBrowserPassView
        • Infornito
        • Hindsight
        • BrowserFreak
        • BrowserStealer
    • Hack The Box Tracks
      • Soc Analyst Path 2024
        • 1. Incident Handling Process
          • Incident Handling Definition & Scope
          • Incident Handling's Value & Generic Notes
          • Cyber Kill Chain
          • Incident Handling Process Overview
          • Preparation Stage (Part 1)
          • Preparation Stage (Part 2)
          • DMARC
          • Endpoint Hardening (& EDR)
          • Network Protection
          • Privilege Identity Management / MFA / Passwords
          • Vulnerability Scanning
          • User Awareness Training
          • Active Directory Security Assessment
          • Purple Team Exercises
          • Detection & Analysis Stage (Part 1)
          • Initial Investigation
          • Incident Severity & Extent Questions
          • Incident Confidentiality & Communication
          • Detection & Analysis Stage (Part 2)
          • The Investigation
          • Initial Investigation Data
          • Creation & Usage Of IOCs
          • Identification Of New Leads & Impacted Systems
          • Data Collection & Analysis From The New Leads & Impacted Systems
          • Containment
          • Eradication
          • Recovery
          • Post-Incident Activity Stage
          • Reporting
        • 2. Security Monitoring & SIEM Fundamentals
          • What Is SIEM?
          • The Evolution Of SIEM And How It Works
          • SIEM Business Requirements & Use Cases Log Aggregation & Normalization
          • Data Flows Within A SIEM
          • What Are The Benefits Of Using A SIEM Solution
          • What Is the Elastic Stack?
          • The Elastic Stack As A SIEM Solution
          • How To Identify The Available Data
          • The Elastic Common Schema (ECS)
          • SOC Definition & Fundamentals
          • Evolution of Security Operations Centers (SOCs)
          • What Is MITRE ATT&CK?
          • What Is A SIEM Use Case?
          • How To Build SIEM Use Cases
          • SIEM Visualization Example 1: Failed Logon Attempts (All Users)
          • SIEM Visualization Example 2: Failed Logon Attempts (Disabled Users)
          • SIEM Visualization Example 3: Successful RDP Logon Related To Service Accounts
          • SIEM Visualization Example 4: Users Added or Removed from a Local Group
          • What Is Alert Triaging?
  • COURSES SUMMARY
    • TCM SEC
      • TCM linux Privilege Escalation
      • TCM OSINT
    • The SecOps Group
      • Certified AppSec Practitioner exam
      • CNSP Review
    • Cybrary
      • Cybrary Offensive Pentesting
  • TIPS&TRICKS
    • Windows Shorcuts Arrow Remover
    • Kali KEX
    • Intel TurboBoost
    • Pentest_Copilot
    • Ferdium
    • Youtube Adblock_Bybass
    • Burb-Bambdas
    • Burb Customizer
    • BetterFox
Powered by GitBook
On this page
  • 1- The Question Is talking About the Cryptography and simply it it the salting concept that add a random value to the hash to make it unique and the main Purpose for the salting is defending the hash from The rainbow table dictionary attacks Which is answer
  • 2- To Prevent The click jacking attack we add the appropriate directive in the CSP HTTP response header is "frame-ancestors" The Frame ancestors in the CSP specifies which sources are allowed to embed the webpage in an iframe " <frame> OR <object> " but denying framing through this directly so Protecting the Web Application from Click-jacking attack Which is Answer
  • 3- Here The question Talking about is vulerable to Xss which is not possible to do ok steal the user`s session is possible when the cookie is not in the HttpOnly cookie , Stael the Contents from the web page also possible , steal contents from the users keystroke yeah it also possible we talking about injecting a Script to webpage xss is much more critical than alert BTW so steal the contents for the application database it`s not possible Which is Answer
  • 4-Here From first look we can detect That we are talking about File Upload Vulnerability and this is the important you have one minute BTW but let analysis the questions Http Desync attack which is Request Smuggling and it` work by confuse how intermediary servers (such as proxies, load balancers, or firewalls) process requests before they reach the intended destination and it will be usually the back end Server and it target the content length and the host i think here there is not , File path Traversal i didn`t see any Payloads try to enter the server , SSRF i Also didn`t see payloads try to re forced the web-application to a server belongs to the attacker so it`s File upload Definitely there is a parameter for the filename will burn our eyes (: Which is Answer
  • 5- Which Combination is vulnerable simply when Access-Control-Allow-Origin is set to * it`s mean that any domain can make request to the server and if Access-Control-Allow-Credentials to true it allows cross-origin requests to include credentials, such as session cookies or authentication headers Which is Answer
  • 6- To Be Honest I Saw the Developer is look like Hagres Tell Hey Attackers Hackers this is the framework name and the version come and concentrate on This version and try to Found a bug simply in this request easily the attacker can see the version and framework Which is Answer
  • 7- Here We are talking about CVE-2021-44228 This CVE related directly to JNDI version and here The question playing on the spelling Which is Answer
  • 8- Here we are talking for the protocols Versions OK {SSLv2 and SSLv3} is insecure due to vulnerabilities like iPOODLE attack and the lack of Cryptography Techniques {TLSv1.0,TLSv2.0} Is Improvement for the ssl but it also vulnerable to BEAST and Lucky 13 attacks {TLSv1.1 and 1.3 } Is considered Secure so the Answer is
  • 9-Here The Response contain all the above disclose the server version and disclose the framework used and also used outdated server which is Answer
  • 10-The browser contain Public key trusted CA and stored in browser and also contain TLs certificate to the browser uses the CA’s public key and private key when signature matches, the browser knows the certificate is legitimate Which is Answer
  • 11-What is the WordPress file Contain all this Details is WP-conf don`t be hesitate and choose WP-secret (: Which answer
  • 12-The Function is used to read The contents of a file from the server file is Load_file Function Which is Answer
  • 13-Which Is safe Password it`s easy BTW The password that contain small and large and numbers and special Characters Which is Answer
  • 14-Here This request didn`t contain any method to prevent CSRF attack token for example and this is easily lead the attacker form a post request and smoothly change the password which is Answer
  • 15-Here in this Request Easily we can detect the payload for the LFI so simply it`s path traversal which is Answer
  • 16-After Analysis the code the Most applicable for this scenario is Component with know vulnerability use old third party library like j query 1.8.6 leads to a leak of security Which is answer
  • 17- After break out each link we can easily detect that the first link is only have same host,scheme and port as original URL Which is Answer
  • 18- The problem are described her is IDOR vulnerability where the attacker can manipulate parameters that can access information not authorized to view So by validating the user privilege and the weakness of authorization the issue can be fixed which is Answer
  • 19- The docker-compose.yml file is a configuration file used by Docker Compose to define and manage multi-container Docker applications It allows you to describe the services your application needs, such as databases, web servers, and application servers, as well as how they interact (e.g., networks, volumes). Key data that can be found in this file include services, networks, volumes,Environment variables but is doesn`t contain server logs , session information , load balancer and firewall which is Answer
  • 20- The Easiest Question Till now and The Full Form Which is answer
  • 21-When a browser makes a request to a web server, it includes an HTTP "Host" header that specifies the domain name the client is trying to reach The website this allow the web server to determine which specific website Which is Answer
  • 22-After Analysis the Code attacker to potentially input malicious filenames like "../../../etc/passwd" to access files outside of the intended directory SO it`s Path Traversal and there is no evidence till that There was RCE happens which is Answer
  • 23-The null Bytes as \0 in the most of languages so after encoded it simply be %00 and BTW null bytes leads to a lot of injections to bypass the input validation Which is Answer
  • 24- Here We talking about Technique in GraphQl introspection Simply this technique related to Reacted to Other Systems Which is Answer
  • 25-When We talking about Finding directory listing in Google Dorks We Can Used {intitle& intext} which is Answer
  • 26-The Race Condition Happens when two or more threads or processes attempt to access or modify the same resource concurrently Which Is Answer
  • 27-Every Bug has a most common Payloads when we Saw them we directly Know the bug And this our payload Here we talking about SSTI which is Answer
  • 28-Simply there is one Http Header To Control Access to resources on the Server Which is Answer
  • 29-In The context of Dependency of Confusion Attack occurs when attackers take advantage of package managers For Node.js {package.JSON} , for Python {Requirements.txt} Which is Answer
  • 30-IN This Question We talking about SAML Security and simply Xml Signature Wrapping , XXE , Reply attack the three is attacks related to SAML Which is Answer
  • 31- Here We talking about NoSql Injection Scenarios and The both Statements are Accurate Which is Answer
  • 32- Here We Have JWT Token and jwt token consists of three parts separated by dot {Header, Payload, Signature} This Highlighted part shows is the Header Which is Answer
  • 33- Here We are with the same token and the blue part represent the signature Which is Answer
  • 34-If the end user Input not validated or sanitized all this frameworks is directly prone to insecure Serialization , .NET will be vulnerable to {BinaryFormatter without proper checks} , JAVA {built-in serialization mechanism can be exploited} , and PHP {unserialize() function is notorious for introducing vulnerabilities} Which is Answer
  • 35- Here we talking about xmlrpc.php endpoint and the only CMS uses this is WP which is Answer
  • 36- When We talking about the most effective way to prevent XSS Simply it`s Whitelisting Which is Answer
  • 37- The security attribute send the cookie over TLS channel is Secure Attribute Which is Answer
  • 38- Where We talking about robots.txt Which is the developers must not list any sensitive Info on it because it`s easy to be Crawled Which is Answer
  • 39-Here We Talking about Purchasing item and the Most vulnerability hits this website is IDOR and this is our Scenario here which is Answer
  • 40-Here We Have again the IDOR Scenario and simply the two solutions will not fix the problem because simply the hacker can decode The Base64 and the hash value also can be determined Which is Answer
  • 41- Here We Saw the Request and the Response the Application is Vulnerable to Open redirect for Three reasons {The GET request to "/dashboard.php" includes a "URL" parameter with the value "http://attacker.com" , The response shows a 302 Found status code, redirecting to "http://attacker.com" (as seen in the Location header), } So Simply it indicates that the application is taking the URL from the request parameter and redirecting to it without proper validation Which is Answer
  • 42-In This Login Page We can easily determine That the code is Vulnerable to Username enumeration because it simply tell us that this user not exist so i will give you a list contain 10 million name and one will be exist Inshaallah (: Which is Answer
  • 43- To Prevent Click jacking attack we specifically designed x-frame-options {It controls whether a browser should be allowed to render a page in <frame>, <iframe> etc} Which is Answer
  • 44- Here All this Attacks is Server Side except XXS is client side Which is Answer
  • 45-Here We can easily detect that The link uses insecure channel by use http and also the reset link includes user token Which is Answer
  • 46-In This question we again didn`t Solve the Previous Problem for the token Which is Answer
  • 47-The Most Secure Algorithm is Bcrypt Which is Answer
  • 48-Here The only algorithm Not ASymmertric is AES Which is Answer
  • 49- Here Don`t Be Hasetate it` s not the same Question it`s the opposite BTW (: Which is Answer
  • 50-Here When you Look at the request we will find That the attacker put the local host / admin which is Directly SSRF Which is Answer
  • 51-Here all the statments is true The application uses http and also used get and also vulnerable to xss Which is Answer
  • 52-Here we didn`t have any defending Mechanism against CSRF no token same site attribute Which is Answer
  • 53-When The TLS Certificate is expired the connection is Still over it but the browser will give error Which is Answer
  • 54- Sure The admin Renew the Certificate Which is Answer
  • 55-MFA didn`t affect on XSS or CSRF also LFI and RFI Which is Answer
  • 56- All This attributes is Used to secure Cookie Except Restrict Which is Answer
  • 57-The Most Important Defense On SQLI is the sensitization the input Which is Answer
  • 58- The Most secure HTTP Header prevent caching is no-cashe, no-store Which is Answer
  • 59-Here is a XSS payload uses src Which is Answer
  • 60-Here The Post Request shown The Xml injection payload Which is Simply Anwer
  1. COURSES SUMMARY
  2. The SecOps Group

Certified AppSec Practitioner exam

Answer & Explain the Questions of The exam

PreviousThe SecOps GroupNextCNSP Review

Last updated 8 months ago

1- The Question Is talking About the Cryptography and simply it it the salting concept that add a random value to the hash to make it unique and the main Purpose for the salting is defending the hash from The rainbow table dictionary attacks Which is answer

"A"

2- To Prevent The click jacking attack we add the appropriate directive in the CSP HTTP response header is "frame-ancestors" The Frame ancestors in the CSP specifies which sources are allowed to embed the webpage in an iframe " <frame> OR <object> " but denying framing through this directly so Protecting the Web Application from Click-jacking attack Which is Answer

"C"

3- Here The question Talking about is vulerable to Xss which is not possible to do ok steal the user`s session is possible when the cookie is not in the HttpOnly cookie , Stael the Contents from the web page also possible , steal contents from the users keystroke yeah it also possible we talking about injecting a Script to webpage xss is much more critical than alert BTW so steal the contents for the application database it`s not possible Which is Answer

"C"

4-Here From first look we can detect That we are talking about File Upload Vulnerability and this is the important you have one minute BTW but let analysis the questions Http Desync attack which is Request Smuggling and it` work by confuse how intermediary servers (such as proxies, load balancers, or firewalls) process requests before they reach the intended destination and it will be usually the back end Server and it target the content length and the host i think here there is not , File path Traversal i didn`t see any Payloads try to enter the server , SSRF i Also didn`t see payloads try to re forced the web-application to a server belongs to the attacker so it`s File upload Definitely there is a parameter for the filename will burn our eyes (: Which is Answer

"C"

5- Which Combination is vulnerable simply when Access-Control-Allow-Origin is set to * it`s mean that any domain can make request to the server and if Access-Control-Allow-Credentials to true it allows cross-origin requests to include credentials, such as session cookies or authentication headers Which is Answer

"A"

6- To Be Honest I Saw the Developer is look like Hagres Tell Hey Attackers Hackers this is the framework name and the version come and concentrate on This version and try to Found a bug simply in this request easily the attacker can see the version and framework Which is Answer

"A"

7- Here We are talking about CVE-2021-44228 This CVE related directly to JNDI version and here The question playing on the spelling Which is Answer

"B"

8- Here we are talking for the protocols Versions OK {SSLv2 and SSLv3} is insecure due to vulnerabilities like iPOODLE attack and the lack of Cryptography Techniques {TLSv1.0,TLSv2.0} Is Improvement for the ssl but it also vulnerable to BEAST and Lucky 13 attacks {TLSv1.1 and 1.3 } Is considered Secure so the Answer is

"C"

9-Here The Response contain all the above disclose the server version and disclose the framework used and also used outdated server which is Answer

"D"

10-The browser contain Public key trusted CA and stored in browser and also contain TLs certificate to the browser uses the CA’s public key and private key when signature matches, the browser knows the certificate is legitimate Which is Answer

"B"

11-What is the WordPress file Contain all this Details is WP-conf don`t be hesitate and choose WP-secret (: Which answer

"B"

12-The Function is used to read The contents of a file from the server file is Load_file Function Which is Answer

"B"

13-Which Is safe Password it`s easy BTW The password that contain small and large and numbers and special Characters Which is Answer

"C"

14-Here This request didn`t contain any method to prevent CSRF attack token for example and this is easily lead the attacker form a post request and smoothly change the password which is Answer

"C"

15-Here in this Request Easily we can detect the payload for the LFI so simply it`s path traversal which is Answer

"B"

16-After Analysis the code the Most applicable for this scenario is Component with know vulnerability use old third party library like j query 1.8.6 leads to a leak of security Which is answer

"C"

17- After break out each link we can easily detect that the first link is only have same host,scheme and port as original URL Which is Answer

"A"

18- The problem are described her is IDOR vulnerability where the attacker can manipulate parameters that can access information not authorized to view So by validating the user privilege and the weakness of authorization the issue can be fixed which is Answer

"B"

19- The docker-compose.yml file is a configuration file used by Docker Compose to define and manage multi-container Docker applications It allows you to describe the services your application needs, such as databases, web servers, and application servers, as well as how they interact (e.g., networks, volumes). Key data that can be found in this file include services, networks, volumes,Environment variables but is doesn`t contain server logs , session information , load balancer and firewall which is Answer

"C"

20- The Easiest Question Till now and The Full Form Which is answer

"A"

21-When a browser makes a request to a web server, it includes an HTTP "Host" header that specifies the domain name the client is trying to reach The website this allow the web server to determine which specific website Which is Answer

"A"

22-After Analysis the Code attacker to potentially input malicious filenames like "../../../etc/passwd" to access files outside of the intended directory SO it`s Path Traversal and there is no evidence till that There was RCE happens which is Answer

"A"

23-The null Bytes as \0 in the most of languages so after encoded it simply be %00 and BTW null bytes leads to a lot of injections to bypass the input validation Which is Answer

"D"

24- Here We talking about Technique in GraphQl introspection Simply this technique related to Reacted to Other Systems Which is Answer

"A"

25-When We talking about Finding directory listing in Google Dorks We Can Used {intitle& intext} which is Answer

"C"

26-The Race Condition Happens when two or more threads or processes attempt to access or modify the same resource concurrently Which Is Answer

"A"

27-Every Bug has a most common Payloads when we Saw them we directly Know the bug And this our payload Here we talking about SSTI which is Answer

"A"

28-Simply there is one Http Header To Control Access to resources on the Server Which is Answer

"C"

29-In The context of Dependency of Confusion Attack occurs when attackers take advantage of package managers For Node.js {package.JSON} , for Python {Requirements.txt} Which is Answer

"C"

30-IN This Question We talking about SAML Security and simply Xml Signature Wrapping , XXE , Reply attack the three is attacks related to SAML Which is Answer

"D"

31- Here We talking about NoSql Injection Scenarios and The both Statements are Accurate Which is Answer

"D"

32- Here We Have JWT Token and jwt token consists of three parts separated by dot {Header, Payload, Signature} This Highlighted part shows is the Header Which is Answer

"A"

33- Here We are with the same token and the blue part represent the signature Which is Answer

"B"

34-If the end user Input not validated or sanitized all this frameworks is directly prone to insecure Serialization , .NET will be vulnerable to {BinaryFormatter without proper checks} , JAVA {built-in serialization mechanism can be exploited} , and PHP {unserialize() function is notorious for introducing vulnerabilities} Which is Answer

"D"

35- Here we talking about xmlrpc.php endpoint and the only CMS uses this is WP which is Answer

"A"

36- When We talking about the most effective way to prevent XSS Simply it`s Whitelisting Which is Answer

"B"

37- The security attribute send the cookie over TLS channel is Secure Attribute Which is Answer

"A"

38- Where We talking about robots.txt Which is the developers must not list any sensitive Info on it because it`s easy to be Crawled Which is Answer

"A"

39-Here We Talking about Purchasing item and the Most vulnerability hits this website is IDOR and this is our Scenario here which is Answer

"A"

40-Here We Have again the IDOR Scenario and simply the two solutions will not fix the problem because simply the hacker can decode The Base64 and the hash value also can be determined Which is Answer

"B"

"A"

42-In This Login Page We can easily determine That the code is Vulnerable to Username enumeration because it simply tell us that this user not exist so i will give you a list contain 10 million name and one will be exist Inshaallah (: Which is Answer

"A"

43- To Prevent Click jacking attack we specifically designed x-frame-options {It controls whether a browser should be allowed to render a page in <frame>, <iframe> etc} Which is Answer

"C"

44- Here All this Attacks is Server Side except XXS is client side Which is Answer

"B"

45-Here We can easily detect that The link uses insecure channel by use http and also the reset link includes user token Which is Answer

"D"

46-In This question we again didn`t Solve the Previous Problem for the token Which is Answer

"B"

47-The Most Secure Algorithm is Bcrypt Which is Answer

"D"

48-Here The only algorithm Not ASymmertric is AES Which is Answer

"A"

49- Here Don`t Be Hasetate it` s not the same Question it`s the opposite BTW (: Which is Answer

"D"

50-Here When you Look at the request we will find That the attacker put the local host / admin which is Directly SSRF Which is Answer

"D"

51-Here all the statments is true The application uses http and also used get and also vulnerable to xss Which is Answer

"D"

52-Here we didn`t have any defending Mechanism against CSRF no token same site attribute Which is Answer

"A"

53-When The TLS Certificate is expired the connection is Still over it but the browser will give error Which is Answer

"B"

54- Sure The admin Renew the Certificate Which is Answer

"B"

55-MFA didn`t affect on XSS or CSRF also LFI and RFI Which is Answer

"D"

56- All This attributes is Used to secure Cookie Except Restrict Which is Answer

"C"

57-The Most Important Defense On SQLI is the sensitization the input Which is Answer

"B"

58- The Most secure HTTP Header prevent caching is no-cashe, no-store Which is Answer

"A"

59-Here is a XSS payload uses src Which is Answer

"A"

60-Here The Post Request shown The Xml injection payload Which is Simply Anwer

"D"

Whooha Finally Finished Nice Exam Thanks For Reading (:

41- Here We Saw the Request and the Response the Application is Vulnerable to Open redirect for Three reasons {The GET request to "/dashboard.php" includes a "URL" parameter with the value "" , The response shows a 302 Found status code, redirecting to "" (as seen in the Location header), } So Simply it indicates that the application is taking the URL from the request parameter and redirecting to it without proper validation Which is Answer

http://attacker.com
http://attacker.com
Page cover image