1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
2 years ago
6

Which attack occurs when the attacker is able to browse for directories and files outside the normal application access?

Social Studies
1 answer:
Damm [24]2 years ago
4 0

Directory traversal.

Directory traversal (path traversal) happens when the attacker is in a position to read files on the online server outside of the directory of the website. Properly controlling access to an online page is crucial for running a secure web server. Directory traversal or Path Traversal is an HTTP attack that enables attackers to access restricted directories and execute commands outside of the online server’s root directory.

With a system at risk of directory traversal, an attacker can make use of this vulnerability to get out of the foundation directory and access other parts of the classification system. This might give the attacker the power to look at restricted files, which could provide the attacker with more information required to further compromise the system.

Therefore it all depends on what the website user has been given access to within the system. Apart from vulnerabilities within the code, even the net server itself will be receptive to directory traversal attacks. the matter can either be incorporated into the net server software or inside some sample script files left available on the server.  

while you may be employing a web server software version that has fixed this vulnerability, you would possibly still have some sensitive default script directories exposed which are well-known to hackers. The best thanks to check whether your website and web applications are prone to directory traversal attacks are by employing a Web Vulnerability Scanner.

learn more about directories and files: brainly.com/question/20787793

#SPJ4

You might be interested in
True or false , third parties often revolve around political personality such as theodore roosevelt?
IRINA_888 [86]

I believe the answer is True,

4 0
3 years ago
Before the arrival of Europeans, which region in Australia housed the largest number of Aboriginal people? A) 2 B) 3 C) 4 D) 5
AnnyKZ [126]
B i think sorry if im wrong
8 0
4 years ago
What was the significance of the Convention of 1836?
cestrela7 [59]

Answer:

The Convention of 1836 wrote the Texas Declaration of Independence, prepared a constitution, organized an interim government, and named Sam Houston commander-in-chief before hastily adjourning on March 17 to respond to Santa Anna's invading army.

3 0
3 years ago
Read 2 more answers
How has the population of jordan changed in the past 20 years?
Tju [1.3M]
In 2018, the population of Jordan is estimated at 9.90 million, which makes it the 100th most populous nation.here are about 500,000 Iraqis, and over 500,000 Syrian refugees have moved to Jordan to escape violence in the last two years. 
3 0
3 years ago
Why did xerxes want to conquer greece
Anon25 [30]
To increase the country’s wealth, to win glory, for revenge
9 0
4 years ago
Read 2 more answers
Other questions:
  • What is a example of democracy?
    15·1 answer
  • If a hispanic teenager refuses to speak spanish outside the home, uses spanglish inside, and only english everywhere else, what
    8·2 answers
  • What was it about the Stamp Act specifically and the way the colonists responded to it that paved the way for the American Revol
    6·1 answer
  • The popular phrase mind over matter is a generalized notion of which system of thought
    6·1 answer
  • When people with a diagnosable personality disorder seek treatment, it is usually not for their
    11·1 answer
  • Listed following are a series of statements that each make a claim. Classify these as either testable by accepted methods of sci
    15·1 answer
  • What are the three main stages that cases before the Supreme Court typically must go through?
    5·1 answer
  • The Cold War was the rivalry between which types of nations?
    8·2 answers
  • How are the economic systems of Nigeria and South Africa similar? Choose all that apply. A) Both countries have a mixed economic
    6·1 answer
  • _____ attributes are key product attributes that are most likely to affect a buyer's final choice. these attributes are usually
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!