• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which type of attack is where an attacker inputs malicious code into a log file?

  • log tampering
  • log poisoning
  • log denial of service
  • log redirection
Explanation & Hint:

The type of attack where an attacker inputs malicious code into a log file is known as “log poisoning.”

Log poisoning involves injecting malicious code or queries into log files with the intention that they will be executed or interpreted by another system or application that processes these logs. For example, if a web application does not properly sanitize user input that gets logged, an attacker could input scripts or SQL queries that might be executed when the logs are reviewed or processed, leading to further exploitation.

For more Questions and Answers:

Threat Analysis Post-Assessment | CBROPS

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments