51.8k views
4 votes
If an attacker is able to gain access to restricted directories through HTTP, it is known as?

A. Cross-site forgery
B. Directory traversal
C. Root hardening
D. Trusted platform corruption

User OArnarsson
by
8.4k points

1 Answer

6 votes

Final answer:

Directory Traversal is a security vulnerability that allows attackers to access restricted directories through HTTP by manipulating file reference variables. It's important to employ security measures like input validation and proper coding practices to prevent such attacks.

Step-by-step explanation:

If an attacker is able to gain access to restricted directories through HTTP, it is known as Directory Traversal. This security vulnerability allows hackers to access files and directories that are stored outside the web server's root directory. By manipulating variables that reference files with '..\/..' (dot-dot-slash), attackers can move up to restricted directories and access sensitive files.

Hackers have a variety of methods to break into websites, such as leveraging weaknesses in input validation to gain unauthorized access to the filesystem. These attacks are sometimes referred to as dot-dot-slash, directory climbing, or backtracking. Protecting against directory traversal involves proper security measures such as input validation, using security-focused coding practices, and enforcing principle of least privilege on the web server.

It's crucial to differentiate between the different types of security threats. Options like Cross-site forgery (A), Root hardening (C), and Trusted platform corruption (D) are not related to the act of exploiting HTTP to access restricted directories. Directory traversal remains a significant concern in web security, and awareness is key to safeguarding against such exploits.

User Hasib Tarafder
by
7.3k points