Which of the following log injection attacks uses white space padding to create unusual log
entries?
A.
Word wrap abuse attack
B.
HTML injection attack
C.
Terminal injection attack
D.
Timestamp injection attack
Which of the following log injection attacks uses white space padding to create unusual log
entries?
Which of the following log injection attacks uses white space padding to create unusual log
entries?
A.
Word wrap abuse attack
B.
HTML injection attack
C.
Terminal injection attack
D.
Timestamp injection attack