Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 87 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 87
Topic #: 1
[All 312-50v12 Questions]

Daniel is a professional hacker who is attempting to perform an SQL injection attack on a target website, www.moviescope.com. During this process, he encountered an IDS that detects SQL injection attempts based on predefined signatures. To evade any comparison statement, he attempted placing characters such as “’or ‘1’=‘1’” in any basic injection statement such as “or 1=1.”
Identify the evasion technique used by Daniel in the above scenario.

  • A. Char encoding
  • B. IP fragmentation
  • C. Variation
  • D. Null byte
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jeremy13
Highly Voted 1 year, 7 months ago
Selected Answer: C
C. Variation Like 312-50v11 Q190 CEH BOOK V12 Module 15 P2336 Evasion Technique: Variation Variation is an evasion technique whereby the attacker can easily evade any comparison statement. The attacker does this by placing characters such as “' or '1'='1'” in any basic injection statement such as “or 1=1” or with other accepted SQL comments. The SQL interprets this as a comparison between two strings or characters instead of two numeric values.
upvoted 6 times
...
insaniunt
Most Recent 11 months ago
Selected Answer: C
C. Variation Variation: An attacker uses this technique to easily evade any comparison statement
upvoted 1 times
...
eli117
1 year, 7 months ago
Selected Answer: C
Answer: C. Variation Explanation: In the given scenario, Daniel is attempting to evade the IDS that detects SQL injection attempts based on predefined signatures. To bypass the detection mechanism, he used the variation technique. The variation technique is a method of altering the injection code so that it cannot be detected by an IDS. In this technique, an attacker alters the injection code, for example, by changing the case of letters or by adding extra characters or spaces to the code, to bypass the signature-based detection. By using the variation technique, the attacker can bypass the signature-based detection mechanisms, and the malicious code is executed on the targeted system.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...