Which of the following log injection attacks uses white space padding to create unusual log entries?
A.
Word wrap abuse attack
B.
HTML injection attack
C.
Terminal injection attack
D.
Timestamp injection attack
Which of the following log injection attacks uses white space padding to create unusual log entries?
Which of the following log injection attacks uses white space padding to create unusual log entries?
A.
Word wrap abuse attack
B.
HTML injection attack
C.
Terminal injection attack
D.
Timestamp injection attack