what will he/she inject into the log file?

A system with a simple logging mechanism has not been given much attention during development, this
system is now being targeted by attackers, if the attacker wants to perform a new line injection attack,
what will he/she inject into the log file?

A system with a simple logging mechanism has not been given much attention during development, this
system is now being targeted by attackers, if the attacker wants to perform a new line injection attack,
what will he/she inject into the log file?

A.
HTML tags

B.
Multiple pipe characters

C.
Single pipe character

D.
Plaintext



Leave a Reply 0

Your email address will not be published. Required fields are marked *