Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 78 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 78
Topic #: 1
[All 312-50v12 Questions]

Jason, an attacker, targeted an organization to perform an attack on its Internet-facing web server with the intention of gaining access to backend servers, which are protected by a firewall. In this process, he used a URL https://xyz.com/feed.php?url=externalsite.com/feed/to to obtain a remote feed and altered the URL input to the local host to view all the local resources on the target server.
What is the type of attack Jason performed in the above scenario?

  • A. Web server misconfiguration
  • B. Server-side request forgery (SSRF) attack
  • C. Web cache poisoning attack
  • D. Website defacement
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
insaniunt
11 months ago
Selected Answer: B
B. Server-side request forgery (SSRF) attack
upvoted 1 times
...
Vincent_Lu
1 year, 5 months ago
B. Server-side request forgery (SSRF) attack
upvoted 1 times
...
victorfs
1 year, 6 months ago
Selected Answer: B
The correct option is B. SSRF
upvoted 1 times
...
jeremy13
1 year, 7 months ago
Selected Answer: B
B. Server-side request forgery (SSRF) attack Like : 312-50v11 Q11 Book CEH V12 : Module14 P1948 SSRF vulnerabilities evolve in the following manner. Generally, server-side requests are initiated to obtain information from an external resource and feed it into an application. For instance, a designer can utilize a URL such as https://xyz.com/feed.php?url=externalsite.com/feed/to to obtain a remote feed. If attackers can alter the URL input to the localhost, then they can view all the local resources on the server.
upvoted 4 times
...
eli117
1 year, 7 months ago
Selected Answer: B
B. Server-side request forgery (SSRF) attack Explanation: In the given scenario, Jason performed a Server-side request forgery (SSRF) attack to gain access to backend servers that were protected by a firewall. In an SSRF attack, the attacker sends a request to a web server with a manipulated URL input that points to an external system controlled by the attacker. The web server processes the request, and the attacker can use this to access resources on the server that are not intended to be accessible. In this case, the attacker used the URL input to obtain a remote feed and then manipulated the input to point to the local host, which allowed the attacker to view all local resources on the target server. By exploiting this vulnerability, the attacker could potentially gain access to sensitive information or even take control of the server.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...