Which tool is best for sniffing plaintext HTTP traffic?
As a cybersecurity professional at XYZ Corporation, you are tasked with investigating anomalies in system logs that suggest potential unauthorized activity. System administrators have detected repeated failed login attempts on a critical server, followed by a sudden surge in outbound data traffic. These indicators suggest a possible compromise. Given the sensitive nature of the system and the sophistication of the threat, what should be your initial course of action?
After a breach, investigators discover attackers used modified legitimate system utilities and a Windows service to persist undetected and harvest credentials. What key step would best protect against similar future attacks?
During a red team test, a web application dynamically builds SQL queries using a numeric URL parameter. The tester sends the following request:
DROP TABLE users;
The application throws errors and the users table is deleted. Which SQL injection technique was used?