Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 36 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 36
Topic #: 1
[All 312-50v12 Questions]

Boney, a professional hacker, targets an organization for financial benefits. He performs an attack by sending his session ID using an MITM attack technique. Boney first obtains a valid session ID by logging into a service and later feeds the same session ID to the target employee. The session ID links the target employee to Boney’s account page without disclosing any information to the victim. When the target employee clicks on the link, all the sensitive payment details entered in a form are linked to Boney’s account.
What is the attack performed by Boney in the above scenario?

  • A. Forbidden attack
  • B. CRIME attack
  • C. Session donation attack
  • D. Session fixation attack
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jeremy13
Highly Voted 1 year, 7 months ago
Selected Answer: C
C. Session donation attack see 312-50v11 topic 1 question 188 Module 11 P1552 CEH BOOK V12 In a session donation attack, the attacker donates their own session ID to the target user. In this attack, the attacker first obtains a valid session ID by logging into a service and later feeds the same session ID to the target user. This session ID links a target user to the attacker’s account page without disclosing any information to the victim. When the target user clicks on the link and enters the details (username, password, payment details, etc.) in a form, the entered details are linked to the attacker’s account. To initiate this attack, the attacker can send their session ID using techniques such as cross-site cooking, an MITM attack, and session fixation.
upvoted 20 times
...
Karthikeyan017
Most Recent 5 months ago
Ans: C
upvoted 2 times
...
insaniunt
11 months, 3 weeks ago
Selected Answer: C
From CEH BOOK v 12 - Module 11 Page 1552: A session donation attack involves the following steps: 1 The attacker logs into a service, establishes a legitimate connection with the target web server, and deletes the stored information. 2 The target web server (e.g., http://citibank.com/) issues a session ID, say 0D6441FEA4496C2, to the attacker. 3 The attacker then donates their session ID, say http://citibank.com/?SID=0D6441FEA4496C2, to the victim and lures the victim to click on it to access the website. 4 The victim clicks on the link, believing it to be a legitimate link sent by the bank. This opens the server’s page in the victim’s browser with SID=0D6441FEA4496C2. Finally, the victim enters their information in the page and saves it. ▪ The attacker can now login as themselves and acquire the victim’s information
upvoted 1 times
...
kunnu
1 year, 2 months ago
Answer is C: CEH v12 Module 11 - Page 1552/2113.
upvoted 2 times
...
SailOn
1 year, 2 months ago
Both C and D involves giving the victim a valid session ID, but the defining difference is the source of the session ID. In fixation, it can be any source, but in a donation attack, it must be a session ID belonging to the attacker. So, C
upvoted 3 times
...
Nst6310
1 year, 4 months ago
D. Session fixation attack In a session fixation attack, the attacker (Boney) tricks a user (the target employee) into using a session ID that the attacker already knows and has control over. The attacker may obtain a valid session ID by logging into the service himself and then trick the target employee into using that same session ID.
upvoted 4 times
...
naija4life
1 year, 4 months ago
Selected Answer: D
D. Session fixation attack
upvoted 1 times
...
Rocko1
1 year, 6 months ago
Selected Answer: C
Here is a great article for Session Donation : https://media.defcon.org/DEF%20CON%2017/DEF%20CON%2017%20presentations/DEF%20CON%2017%20-%20alek_amrani-session_donation.pdf
upvoted 3 times
...
victorfs
1 year, 6 months ago
Selected Answer: C
The correct option is C
upvoted 1 times
...
sTaTiK
1 year, 6 months ago
Selected Answer: C
Anser is C in this case.
upvoted 2 times
...
sausageman
1 year, 7 months ago
Selected Answer: C
C. Session donation attack Jeremy13 explanation is correct
upvoted 2 times
...
eli117
1 year, 7 months ago
Selected Answer: D
In a session fixation attack, the attacker fixes a valid session ID for a user, which allows the attacker to hijack the user's session after they authenticate to the targeted application.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...