A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?
I'm a bit confused by the wording of this question. Can an attacker really inject anything they want into a log file? I'll have to review my notes on this type of attack.
Okay, let's see... If the attacker wants to perform a new line injection attack, they would likely inject a newline character, so I'm going to go with option C.
Hmm, this one's tricky. I'm leaning towards option D, just to spice things up a bit. Inject some HTML tags, make the log file more interesting, you know?
Vilma
5 months agoMattie
5 months agoGennie
5 months agoDan
5 months agoDino
5 months agoSue
6 months agoAshlyn
6 months agoJulian
6 months agoSantos
6 months agoMarci
7 months agoRegenia
7 months agoRaelene
7 months agoYuki
7 months agoCeleste
7 months agoGolda
11 months agoAlex
11 months agoAnglea
11 months agoBulah
11 months agoDion
11 months agoEvan
11 months agoDenise
11 months agoCortney
11 months agoBulah
11 months agoGenevieve
12 months agoVelda
12 months agoFrance
10 months agoEva
11 months agoMinna
11 months agoLeonida
11 months agoJulian
12 months agoLavonda
1 year agoWillow
1 year agoJesusa
11 months agoColette
11 months agoJolene
11 months agoLaurel
1 year agoEthan
11 months agoVallie
11 months agoAnglea
12 months ago