A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?
I'm a bit confused by the wording of this question. Can an attacker really inject anything they want into a log file? I'll have to review my notes on this type of attack.
Okay, let's see... If the attacker wants to perform a new line injection attack, they would likely inject a newline character, so I'm going to go with option C.
Hmm, this one's tricky. I'm leaning towards option D, just to spice things up a bit. Inject some HTML tags, make the log file more interesting, you know?
Vilma
2 months agoMattie
2 months agoGennie
2 months agoDan
3 months agoDino
3 months agoSue
3 months agoAshlyn
3 months agoJulian
4 months agoSantos
4 months agoMarci
4 months agoRegenia
4 months agoRaelene
4 months agoYuki
5 months agoCeleste
5 months agoGolda
8 months agoAlex
9 months agoAnglea
9 months agoBulah
8 months agoDion
8 months agoEvan
8 months agoDenise
9 months agoCortney
9 months agoBulah
9 months agoGenevieve
9 months agoVelda
9 months agoFrance
8 months agoEva
8 months agoMinna
9 months agoLeonida
9 months agoJulian
9 months agoLavonda
9 months agoWillow
10 months agoJesusa
8 months agoColette
8 months agoJolene
9 months agoLaurel
10 months agoEthan
8 months agoVallie
9 months agoAnglea
9 months ago