Exam PT0-002 All QuestionsBrowse all questions from this exam
Question 290

During an assessment, a penetration tester Inspected a log and found a series of thousands of requests coming from a single IP address to the same URL. A few of the requests are listed below:

Which of the following vulnerabilities was the attacker trying to exploit?

    Correct Answer: D

    The pattern of incrementing the 'serviceID' parameter in the URL suggests that the attacker is attempting to exploit an Insecure Direct Object Reference (IDOR) vulnerability. In an IDOR vulnerability, the application exposes internal implementation objects such as files or records via user-controllable inputs. The attacker can then manipulate these inputs to gain access to unauthorized objects or data. The observed behavior of sequentially changing the 'serviceID' aligns well with this type of vulnerability, where the attacker attempts to access objects by directly modifying the reference ID in the URL.

Discussion
TiredOfTestsOption: D

D. Insecure Direct Object Reference (IDOR) The attacker is sequentially changing the serviceID parameter in the URL, likely in an attempt to access objects that they are not authorized to see. This is indicative of an attempt to exploit an Insecure Direct Object Reference (IDOR) vulnerability, where unauthorized access to objects can occur by manipulating input or changing parameters in the URL.

[Removed]Option: D

Going with D on this one

MordorOption: B

B. URL manipulation Explanation: URL manipulation (Option B): Involves altering the parameters or components of a URL to manipulate the behavior of a web application. In this case, the attacker appears to be incrementing the "Id" parameter in the URL sequentially, which could be an attempt to manipulate or test the behavior of the servericestatus.php script. While the specific intent depends on the context of the application, this pattern is consistent with URL manipulation, where an attacker may be exploring the application for vulnerabilities or attempting to access different resources by manipulating the parameter values

Etc_Shadow28000Option: D

D. Insecure direct object reference (IDOR): This vulnerability occurs when an application exposes internal implementation objects (like files, database records) through a URL, and users can manipulate the URL to access objects directly. The pattern of incrementing serviceID values suggests that the attacker is trying to access different records by directly modifying the reference ID in the URL. A. Session hijacking: This involves stealing or using someone else’s session to gain unauthorized access. The observed pattern does not indicate any attempt to hijack sessions. B. URL manipulation: This is a broader term that can encompass various attacks involving changing URL parameters. While it is technically correct, it does not specify the type of vulnerability being exploited. C. SQL injection: This attack involves injecting SQL queries to manipulate the database. The URLs do not show any SQL code being injected; they are simply incrementing an ID parameter.

HappyG

Where's the last 6 questions?