Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 218 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 218
Topic #: 1
[All 312-50v12 Questions]

An ethical hacker is testing the security of a website's database system against SQL Injection attacks. They discover that the IDS has a strong signature detection mechanism to detect typical SQL injection patterns. Which evasion technique can be most effectively used to bypass the IDS signature detection while performing a SQL Injection attack?

  • A. Employ IP fragmentation to obscure the attack payload
  • B. Implement case variation by altering the case of SQL statements
  • C. Leverage string concatenation to break identifiable keywords
  • D. Use Hex encoding to represent the SQL query string
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
49f4430
6 months ago
Ok D but why not C? it also evade IDS and chatGPT says is more easy to implement
upvoted 1 times
...
LordXander
7 months, 3 weeks ago
Selected Answer: D
I would go with D because A is more specific with bypassing network traffic...
upvoted 1 times
LordXander
7 months, 3 weeks ago
Also I really doubt the usage of "obscure" for the payload
upvoted 1 times
...
...
qtygbapjpesdayazko
8 months, 1 week ago
Selected Answer: D
The most efective "D. Use Hex encoding to represent the SQL query string" Hex encoding is an evasion technique that uses hexadecimal encoding to represent a string. Attackers use hex encoding to obfuscate the SQL query so that it will not be detected in the signatures of security measures, as most IDS do not recognize hex encodings. Attackers exploit such IDS to bypass their SQL injection crafted inputs. Hex encoding provides countless ways for attackers to obfuscate each URL.
upvoted 1 times
...
Spam_Protection
8 months, 2 weeks ago
Selected Answer: D
D: Module 15, it has its own section.
upvoted 1 times
...
Bobite
8 months, 3 weeks ago
Selected Answer: D
Might be D because A can't be a good answer. The server IS sending to the bdd so can't be splitted
upvoted 1 times
...
anarchyeagle
8 months, 4 weeks ago
C. Leverage string concatenation to break identifiable keywords: String concatenation involves splitting SQL keywords and data within the injection payload, making it harder for signature-based IDS systems to match the payload against known SQL injection patterns. This technique can effectively obscure the malicious SQL code, making it less likely to be detected by signature-based detection mechanisms.
upvoted 1 times
...
brrbrr
9 months ago
Selected Answer: D
D. Hex encoding involves representing characters in hexadecimal format, which can help obfuscate the SQL query string. By encoding the SQL injection payload in hexadecimal, an attacker can evade signature-based detection mechanisms that typically rely on detecting specific SQL injection patterns or keywords. Its not A, because IP fragmentation is more related to evading network-based detection mechanisms, and it may not be as effective against signature-based detection focused on SQL injection patterns.
upvoted 1 times
...
lukinno
9 months ago
Selected Answer: D
Options B (case variation) and D (Hex encoding) are the most effective strategies for bypassing IDS signature detection during SQL injection attacks. If I have to choose one I vote D
upvoted 1 times
...
qwerty100
9 months, 2 weeks ago
Selected Answer: A
I think it's A: (Module 15 Page 2334) Evasion Technique: IP Fragmentation An attacker intentionally splits an IP packet to spread the packet across multiple small fragments. Attackers use this technique to evade an IDS or WAF. For an IDS or WAF to detect an attack, it must first reassemble the packet fragments. Usually, it is impossible to find a match between the attack string and a signature as each packet is checked individually. These small fragments can be further modified to complicate reassembly and detection of an attack payload.
upvoted 4 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: D
D. Use Hex encoding to represent the SQL query string
upvoted 2 times
...
cloudgangster
9 months, 3 weeks ago
I think its D
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...