Web Security Question:
Explain what does following lines of code show?

Answer:
GET ../../../../etc/shadow HTTP/1.0
- GET is the method that is used to access the files from the server it works the same way like PUT.
- GET method allows the information to be taken from the web server and send it to the user’s browser.
- The directory /etc/ consists of a shadow file that is having the special privileges and only accessible that is having the permissions.
- /etc/shadow consists of all the passwords and usernames that can be accessed and made changes to.
- The file 1.0 of HTTP can be specified by the constructor FileReader and it can attempt to open the file.
- GET is the method that is used to access the files from the server it works the same way like PUT.
- GET method allows the information to be taken from the web server and send it to the user’s browser.
- The directory /etc/ consists of a shadow file that is having the special privileges and only accessible that is having the permissions.
- /etc/shadow consists of all the passwords and usernames that can be accessed and made changes to.
- The file 1.0 of HTTP can be specified by the constructor FileReader and it can attempt to open the file.
Previous Question | Next Question |
Do you know what would have happened if the least privilege principle being followed? | How to write a program that defines the use of fail-safe approach? |