exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 218 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 218
Topic #: 1
[All 312-50v12 Questions]

An ethical hacker is testing the security of a website's database system against SQL Injection attacks. They discover that the IDS has a strong signature detection mechanism to detect typical SQL injection patterns. Which evasion technique can be most effectively used to bypass the IDS signature detection while performing a SQL Injection attack?

  • A. Employ IP fragmentation to obscure the attack payload
  • B. Implement case variation by altering the case of SQL statements
  • C. Leverage string concatenation to break identifiable keywords
  • D. Use Hex encoding to represent the SQL query string
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Mos3ab
5 days, 5 hours ago
Selected Answer: C
When an IDS relies on fixed signatures to detect typical SQL injection patterns, using string concatenation to obfuscate SQL keywords (for example, writing "SEL" + "ECT" instead of "SELECT") can effectively bypass those signatures. This method alters the appearance of the SQL payload without affecting its functionality once processed by the database. In contrast, techniques like case variation are often normalized by the IDS, and hex encoding might be decoded during inspection. IP fragmentation is generally not effective for SQL injection payloads, as it is more suited for network-layer evasion.
upvoted 1 times
...
Lennin
2 weeks, 1 day ago
Selected Answer: C
String concatenation is more effective because it splits up SQL keywords into multiple pieces that are much harder for an IDS to recognize as part of a known attack. For example, splitting SELECT into S + E + L + E + C + T makes it difficult for the IDS to match the attack pattern because the SQL keyword is now fragmented and unrecognizable to signature-based detection.
upvoted 1 times
...
7c4eac1
3 months ago
Selected Answer: C
String concatenation effectively disrupts the recognizable structure of SQL keywords while ensuring the payload remains syntactically valid.
upvoted 1 times
...
49f4430
9 months ago
Ok D but why not C? it also evade IDS and chatGPT says is more easy to implement
upvoted 1 times
...
LordXander
10 months, 3 weeks ago
Selected Answer: D
I would go with D because A is more specific with bypassing network traffic...
upvoted 1 times
LordXander
10 months, 3 weeks ago
Also I really doubt the usage of "obscure" for the payload
upvoted 1 times
...
...
qtygbapjpesdayazko
11 months, 1 week ago
Selected Answer: D
The most efective "D. Use Hex encoding to represent the SQL query string" Hex encoding is an evasion technique that uses hexadecimal encoding to represent a string. Attackers use hex encoding to obfuscate the SQL query so that it will not be detected in the signatures of security measures, as most IDS do not recognize hex encodings. Attackers exploit such IDS to bypass their SQL injection crafted inputs. Hex encoding provides countless ways for attackers to obfuscate each URL.
upvoted 1 times
Mos3ab
5 days, 5 hours ago
While hex encoding can obfuscate the payload, modern IDS are often equipped to decode such encodings during their inspection processes. This means that even if the payload is hex-encoded, the IDS may still recognize the malicious pattern after decoding it. Therefore, relying solely on hex encoding may not be sufficient to bypass IDS signature detection.
upvoted 2 times
...
...
Spam_Protection
11 months, 2 weeks ago
Selected Answer: D
D: Module 15, it has its own section.
upvoted 1 times
...
Bobite
11 months, 3 weeks ago
Selected Answer: D
Might be D because A can't be a good answer. The server IS sending to the bdd so can't be splitted
upvoted 1 times
...
anarchyeagle
11 months, 4 weeks ago
C. Leverage string concatenation to break identifiable keywords: String concatenation involves splitting SQL keywords and data within the injection payload, making it harder for signature-based IDS systems to match the payload against known SQL injection patterns. This technique can effectively obscure the malicious SQL code, making it less likely to be detected by signature-based detection mechanisms.
upvoted 1 times
...
brrbrr
1 year ago
Selected Answer: D
D. Hex encoding involves representing characters in hexadecimal format, which can help obfuscate the SQL query string. By encoding the SQL injection payload in hexadecimal, an attacker can evade signature-based detection mechanisms that typically rely on detecting specific SQL injection patterns or keywords. Its not A, because IP fragmentation is more related to evading network-based detection mechanisms, and it may not be as effective against signature-based detection focused on SQL injection patterns.
upvoted 1 times
...
lukinno
1 year ago
Selected Answer: D
Options B (case variation) and D (Hex encoding) are the most effective strategies for bypassing IDS signature detection during SQL injection attacks. If I have to choose one I vote D
upvoted 1 times
...
qwerty100
1 year ago
Selected Answer: A
I think it's A: (Module 15 Page 2334) Evasion Technique: IP Fragmentation An attacker intentionally splits an IP packet to spread the packet across multiple small fragments. Attackers use this technique to evade an IDS or WAF. For an IDS or WAF to detect an attack, it must first reassemble the packet fragments. Usually, it is impossible to find a match between the attack string and a signature as each packet is checked individually. These small fragments can be further modified to complicate reassembly and detection of an attack payload.
upvoted 4 times
Mos3ab
5 days, 5 hours ago
While IP fragmentation is a valid evasion technique at the network layer, it is not suitable for application-layer attacks like SQL injection. Employing string concatenation to obfuscate SQL keywords is a more effective strategy to bypass IDS signature detection in this context.
upvoted 1 times
...
...
insaniunt
1 year ago
Selected Answer: D
D. Use Hex encoding to represent the SQL query string
upvoted 2 times
...
cloudgangster
1 year ago
I think its D
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago