セキュリティアナリストが Web サーバーのログを確認すると、次のエントリが見つかります。 16.22.48.102 -- 2023年4月26日 22:00:04.33 GET "http://www.databaseInfo.com/index.html/*" 200 16.22.48.102 -- 2023年4月26日 22:00:07.23 GET "http://www.databaseInfo.com/index.html/../" 404 16.22.48.102 -- 2023年4月26日 22:01:16.03 GET "http://www.databaseInfo.com/index.html/../images" 404 16.22.48.102 -- 2023年4月26日 22:03:10.25 GET "http://www.databaseInfo.com/index.html/../passwords" 404 16.22.48.102 -- 2023 年 4 月 26 日 22:05:11.22 GET "http://www.databaseInfo.com/index.html/.. /ストアドSQLクエリ 404 次の攻撃のうち、最も試みられる可能性が高いのはどれですか?
正解:D
The log entries show repeated attempts to access directories using patterns such as ../, which is a common directory traversal attack technique. Directory traversal (or path traversal) aims to access files and directories outside the web server's root directory by manipulating file paths. The ../ sequence is used to move up one directory level, which attackers exploit to try and retrieve sensitive files. Reference: CompTIA Security+ SY0-701 Official Study Guide, Domain 2.2: "Directory traversal attacks attempt to access files and directories outside of the web root by manipulating the file path with ../ sequences." Exam Objectives 2.2: "Given a scenario, analyze potential indicators associated with application attacks."