Professional Documents
Culture Documents
1 message
This Form will be accepting response 𝐭𝐢𝐥𝐥 𝐎𝐜𝐭𝐨𝐛𝐞𝐫 𝟏𝟑, 𝟐𝟎𝟐𝟏 : 𝟐𝟑:𝟓𝟗:𝟓𝟗 𝐏𝐃𝐓
Email *
aryanpratap98765@gmail.com
Full Name *
Name submitted here will be printed as it is on weekly certificates so enter carefully. This would not be
rectified under any circumstances.
Aryan Pratap
Networking Assignment Submission
Make sure to validate your links before submitting. If your links are not valid you won't be graded for that
assignment.
LinkedIn *
Enter Your LinkedIn Post Link. Example is shown how to get the link.
https://www.linkedin.com/posts/aryan7_vtfoundation-vtfoct21-internships-activity-
6853974365688659968-GRn1
Twitter *
Enter Your Twitter Post Link. Example is shown how to get the link. (Facebook link to be submitted for
interns residing in Nigeria)
https://twitter.com/_aryanpratap_/status/1448209212484374531
Yes
No
𝐂𝐨𝐦𝐦𝐞𝐧𝐭𝐞𝐫 𝐋𝐢𝐧𝐤
Technical Assessment
𝐊𝐘𝐂 - 𝐊𝐧𝐨𝐰 𝐘𝐨𝐮𝐫 𝐂𝐨𝐧𝐭𝐞𝐧𝐭 for the week. This week's topic - 𝐁𝐮𝐫𝐩 𝐬𝐮𝐢𝐭𝐞 & 𝐎𝐒𝐖𝐀𝐏 !
When a browser does not check for proper validations and escaping the attack
performed is *
OTP Bypass, Captcha Bypass, 2FA Bypass, Common Password brute force are
examples of *
Broken Authentication
Security Misconfiguration
Disable DTD
Broken Authentication
Security Misconfiguration
The attack in which web sites are exploited by altering backend database queries
through inputting manipulated queries? *
LDAP Injection
SQL Injection
XML Injection
OS Commanding
When the web application has poor randomness of session tokens than the flow
that happens is *
Session Replay
Session Fixation
Session Hijacking
Session Fixation
Session Hijacking
Dictionary Attack
When HTTP cookies with tokens are not flagged as secured the threat that arises is
*
Session Hijacking
Session Replay
Broken Authentication
Security Misconfiguration
The following attack can execute scripts in the user's browser and is capable of
hijacking user sessions, or redirecting the user to malicious sites? *
SQLi
XSS
Open Redirect
CSRF
Session Fixation
Improper Authentication
SQLi
XSS
IDOR
Security Misconfiguration
IDOR
Injection
CSRF
Session Replay
XSS
Session Hijacking
CSRF
Which of the following breaks the trust that a site has in user's browser *
Session Hijacking
CSRF
SQL Injection
XSS
What is Phishing? *
Email Scam
Network Scandal
Computer Virus
You receive an e-mail from evil.com saying that you have won a contest. What
should you do? *
XXE
XSS
CSRF
MFLAC
CSRF
XXE
XSS
If an attacker finds a Zero Day exploit of a vulnerable software which category will
it come in *
Insufficient Logging and Monitoring
Security Misconfiguration
Client
Server
Browser
Web Application
Which of the following is a tool for mapping web applications and uses various
intelligent techniques?
Burp Spider
Burp Intruder
Burp Repeater
Burp Proxy
Review and edit the message to send the message on to the server or browser.
Shows a menu of available actions that can be performed on the currently displayed message
Shows a menu of available actions that can be performed on the currently displayed message
Both A and C
Proxy
Spider
Scanner
User need to log into the Burp Suite for the responses and requests that pass through each of
the proxies.
Which of the following is/are correct about Burp suite walkthrough step in web
application? *
Burp Comparer is used to identify the difference between two responses of applications
quickly in the context of applications on the web.