A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?
Hmm, this one's tricky. I'm leaning towards option D, just to spice things up a bit. Inject some HTML tags, make the log file more interesting, you know?
Alex
8 days agoAnglea
15 days agoEvan
12 hours agoDenise
4 days agoCortney
12 days agoBulah
13 days agoGenevieve
25 days agoVelda
28 days agoMinna
4 days agoLeonida
12 days agoJulian
30 days agoLavonda
1 months agoWillow
1 months agoJolene
13 days agoLaurel
1 months agoEthan
13 hours agoVallie
13 days agoAnglea
28 days ago