3.0 Threats and Vulnerabilities


3.5 Analyze and differentiate among types of application attacks

  • Cross-site scripting
  • SQL injection
  • LDAP injection
  • XML injection
  • Directory traversal/command injection
  • Buffer overflow
  • Zero day
  • Cookies and attachments
  • Malicious add-ons
  • Session hijacking
  • Header manipulation

Recommended

 





Associates