Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 155 discussion

Actual exam question from CompTIA's SY0-601
Question #: 155
Topic #: 1
[All SY0-601 Questions]

SIMULATION -
An attack has occurred against a company.

INSTRUCTIONS -
You have been tasked to do the following:
✑ Identify the type of attack that is occurring on the network by clicking on the attacker's tablet and reviewing the output.
✑ Identify which compensating controls a developer should implement on the assets, in order to reduce the effectiveness of future attacks by dragging them to the correct server.
All objects will be used, but not all placeholders may be filled. Objects may only be used once.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.



Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 2 months ago
I think this is correct. Application Source Code -> Code Review CRM Server - > Record Level access Control Web Server -> WAF and URL Filtering - I initially went with Input Validation instead of URL filtering, but URL filtering works by comparing all web traffic against URL filters, which are typically contained in a database of sites that users are permitted to access or denied from accessing. Database ->Input validation
upvoted 83 times
honeybussy
5 months, 4 weeks ago
Shouldn't the type of attack be session hijacking?
upvoted 2 times
...
LordJaraxxus
8 months ago
It uses cookies so it's XSS
upvoted 1 times
...
stoneface
2 years, 2 months ago
For the attack I think this is a SQLi attack
upvoted 17 times
Protract8593
1 year, 3 months ago
I think it's an XSS attack. ChatGPT said the following: Based on the provided information, the attack shown in the simulation is Cross-Site Scripting (XSS). In this attack, the attacker injects malicious scripts into the web page viewed by other users, typically by exploiting a vulnerability in the web application. The response shows that the attacker has injected a script into the web page that collects user login details (usernames, cookie IDs, and login times) and sends them to the attacker-controlled server. I believe your compensating controls are correct, though. Also, is it just me or is the answer provided for this question correct? It selected the same compensating controls as you and it selected an XSS attack as the attack type.
upvoted 5 times
...
Knowledge33
2 years ago
It's not mentioned in the question that the database is using SQL. It could be Oracle or anything else. It means SQLi is not correct. The unique possibility is XSS attack
upvoted 4 times
Lionel_TheITGuy
1 year, 10 months ago
Oracle dbs use a sql structure though.
upvoted 8 times
...
...
KetReeb
2 years, 2 months ago
Why not Session Hijacking? The output shows that the table used multiple accounts and the session cookies associated with the account IDs.
upvoted 3 times
stoneface
2 years, 2 months ago
Very true - > After digging aroung (again) this could be a Session Hijacking attack, and also a XSS attack - https://owasp.org/www-community/attacks/Session_hijacking_attack But a session hijacking attack or a XSS would not reveal session ids for multiple users, besides there are additional fields on the response (name, login_time), this is information that will tipically be stored on a database. I still believe this is a SQLi attack ... I listen to you.
upvoted 16 times
anonimouse2
2 years, 2 months ago
It is a XSS attack. Check diagram here: https://www.imperva.com/learn/application-security/cross-site-scripting-xss-attacks/
upvoted 16 times
fryderyk
1 year, 1 month ago
Why wouldn't it be sqli? Cookies can be stored on the backend in a db. XSS on the other hand would only allow to steal cookies pertaning to the current user's session.
upvoted 1 times
...
...
...
...
...
Old_Boy_
1 year ago
Hope you're on the CCNA discussions Sir Stone Face. Thanks for your help.
upvoted 9 times
...
...
nobnarb
Highly Voted 2 years ago
The Answer is cross-site scripting, this is from Darryl Gibson's website. Q. A penetration tester has successfully exploited a vulnerability against your organization giving him access to the following data: User, password, login-date, cookie-id Homer, canipass, 2016-09-01 11:12, 286755fad04869ca523320acce0dc6a4 Bart, passican, 2016-09-01 11:15, 8edd7261c353c87a113269cd37635c68 Marge, icanpass, 2016-09-01 11:19, 26887fbd90ac0340e29ad62470270401 What type of attack does this represent? A. SQL injection B. XML injection C. XSS D. Session hijacking Answer: C. Cross-site scripting (XSS) is the best choice of the available answers. You can see that the penetration tester is looking at cookies because the header includes ‘cookie-id’ and successful cross-site scripting (XSS) attacks allow attackers to capture user information such as cookies.
upvoted 37 times
DJCODING
1 year, 8 months ago
Correct option is session hijacking bro isn;t?
upvoted 3 times
BD69
7 months, 2 weeks ago
This is session hijacking because it has a cookie-id. You probably won't get a cookie-id from a database - cookies are stored in the browser
upvoted 1 times
...
...
...
AbdullahMohammad251
Most Recent 5 months, 1 week ago
Session hijacking CRM server ----> none of the above (BLANK) Database----> Record-level access control (to control access to individual records) Web server ---> URL filtering (to prevent the web server from accessing malicious websites) & WAF (to inspect incoming and outgoing HTTP traffic) App source code -----> input validation (to prevent injection attacks) & Code review (following best practices to protect against vulnerabilities)
upvoted 3 times
fb8c9bb
4 months, 3 weeks ago
I believe it is input validation for the database. By validating input, you ensure that only properly formatted data is allowed into the database queries. This helps prevent attackers from injecting malicious SQL commands.
upvoted 2 times
...
...
GigaChungus
7 months, 3 weeks ago
I think this is an SQL injection. If you look at the response data provided, it lists out the data in columns and rows, just like if you were displaying a database table.
upvoted 1 times
...
reto1
7 months, 3 weeks ago
This was in the exam. All the questions were from 1-849. Make sure to understand the questions and the answers. Look it up and study all the details of every question. Don't just memorize it. Understand it and think how you an deploy or use at your work or in enterprise. Exam taken on Mar 2024.
upvoted 7 times
...
7308365
9 months, 1 week ago
Application Source Code within Repository-> Code Review CRM Server-> Record Level Access Control Web Server-> WAF/URL Filtering Database->Input Validation SQL Injection On the login landing page all user credentials were displayed SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed. This information may include any number of items, including sensitive company data, user lists or private customer details.
upvoted 1 times
BD69
7 months, 4 weeks ago
I thought it was weird that they wanted Input Validation, which only happens on the web server, as a mitigation for the database, but, I will agree that it's the only relevant mitigation from the selection. You wouldn't use record level access control on a web database .
upvoted 1 times
...
7308365
9 months, 1 week ago
In simple words, SQL Injection permits an attacker to access data that they would normally be unable to recover.
upvoted 1 times
BD69
7 months, 2 weeks ago
if it was SQLi, how did they get the cookie-id (which is stored in the browser)?
upvoted 1 times
...
Paula77
9 months ago
XSS differs from other web attack vectors (e.g., SQL injections), in that it does not directly target the application itself. Instead, the users of the web application are the ones at risk. Session cookies could be revealed, enabling a perpetrator to impersonate valid users and abuse their private accounts. I believe the correct answer is XSS
upvoted 1 times
...
...
...
Rumchata556
11 months, 3 weeks ago
This was on my exam, 11/29/23
upvoted 8 times
...
Ilginz
12 months ago
I think the answer is correct. Because in the request section, the user enters a username and password, and as a response, the cookie IDs are generated. XSS Attack Scenario: When other users visit the affected page, the injected scripts execute in their browsers, potentially leading to cookie theft, session manipulation, or performing unauthorized actions on the user's behalf. SQLi doesn't make any sense to me. There is no words like "get, select, union etc." or symbols ' ' . Session hijacking intercepts the network traffic and takes control of an active session. There is no sign about it.
upvoted 1 times
...
Frogalicious
1 year ago
Does the "Submit Query" button on the request screen give any credence to this being a SQLi attack?
upvoted 1 times
...
GustavSvenson
1 year ago
The attack seems to be SQLi based on; -The input page shows input which the web-app will use to access the database - The response page shows a list of users --Since it's multiple users, it can only come from the DB and not from a single-scoped attack --The cookie-id field is used to match the cookie-id of the user's sessions--a common way to handle sessions in web apps. --The login times are also common DB options --There're no proof of XSS anywhere and it wouldn't reveal multiple users accounts --There's no evidence of XML anywhere --There's no evidence of session hijacking and it would also be scope to just one account -WAF and URL filtering on the web server -Input validation and Code Review on the Source Code repository (you don't do input validation on the db server--it doesn't care) -Record level access control on the CRM, because it obviously isn't on the db (since multiple records have been exfiltrated)
upvoted 5 times
...
DashRyde
1 year ago
Why input validation would be dragged to Database server? it should be on Application code repo, because it's one of the application security if we are talking about DB security that would be like encrypting sensitive data like DataMasking, Data Tokenization, HashingSalting passwords for example. I think my answer will be: Application Source Code > Code review + Input Validation CRM Server > Record level Access control Web Server > WAF + URL Filtering Regarding the attack I am between Session Hijacking and SQL Injection :(
upvoted 4 times
...
above
1 year, 3 months ago
https://blogs.getcertifiedgetahead.com/cookie-attacks-security/ A SQL injection attack uses a SQL statement, and typically includes a phrase such as or 1=1. An XML injection attack would include XML markup data, with XML tags within the < and > symbols. A session hijacking attack uses a cookie to take over a session. However, it’s more than just the text within a cookie.
upvoted 3 times
...
DriftandLuna
1 year, 3 months ago
is the 1st window the attacker tablet?
upvoted 2 times
...
MorganB
1 year, 6 months ago
MorganB 0 minutes ago Awaiting moderator approval Pass my exam 27, April 23. This question was not on my exam but replaced with another simulation question.
upvoted 3 times
MS2023
1 year, 6 months ago
Do u remember which other PBQ u got pls ?
upvoted 1 times
...
Attila777
1 year, 6 months ago
Do you remember what type of pbq did you have?
upvoted 1 times
...
...
mosher21
1 year, 7 months ago
Why would a web server need a URL filter?
upvoted 3 times
BD69
7 months, 2 weeks ago
web servers have IP filters, so perhaps they're thinking it this way. A url filter is usually for users inside a network to prevent them from accessing bad urls on the Internet (and found on routers or end user hosts). Technically speaking, you wouldn't use this ANYWHERE in this place.
upvoted 1 times
...
...
EduardosSS
1 year, 7 months ago
i'm a bit confused... but in the end i think i'll go for sql injection, if anyone could clarify i'd be grateful!
upvoted 4 times
...
BYU
1 year, 8 months ago
I took my exam yesterday (3/8/2023) and this question was there. 3/4 of PBQs were from here and 80% of MC too. This study community helped me a lot--Thank you!!
upvoted 13 times
Marito1414
1 year, 8 months ago
Do you remember what did you select? SQLI or XSS
upvoted 5 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...