Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 135 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 135
Topic #: 1
[All 312-50v12 Questions]

As a cybersecurity professional, you are responsible for securing a high-traffic web application that uses MySQL as its backend database. Recently, there has been a surge of unauthorized login attempts, and you suspect that a seasoned black-hat hacker is behind them. This hacker has shown proficiency in SQL Injection and appears to be using the 'UNION' SQL keyword to trick the login process into returning additional data. However, your application’s security measures include filtering special characters in user inputs, a method usually effective against such attacks. In this challenging environment, if the hacker still intends to exploit this SQL Injection vulnerability, which strategy is he most likely to employ?

  • A. The hacker tries to manipulate the 'UNION' keyword in such a way that it triggers a database error, potentially revealing valuable information about the database's structure.
  • B. The hacker switches tactics and resorts to a 'time-based blind' SQL Injection attack, which would force the application to delay its response, thereby revealing information based on the duration of the delay.
  • C. The hacker attempts to bypass the special character filter by encoding his malicious input, which could potentially enable him to successfully inject damaging SQL queries.
  • D. The hacker alters his approach and injects a DROP TABLE' statement, a move that could potentially lead to the loss of vital data stored in the application's database.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
insaniunt
Highly Voted 9 months, 2 weeks ago
Selected Answer: C
C - Encoding can work with the special character filter because the filter may not recognize the encoded input as a special character. For example, the filter may block the single quote character (') but not the URL encoded version of it (%27). So the hacker can use the encoded input to trick the filter and still inject malicious SQL commands
upvoted 9 times
qtygbapjpesdayazko
8 months, 3 weeks ago
this is the way
upvoted 1 times
...
...
lmourikis
Most Recent 8 months, 4 weeks ago
The black-hat hacker tries to 'trick the login process into returning additional data'. Also, in the end it is mentioned that 'the hacker still intends to exploit this SQL Injection vulnerability'. So: Not A - He/She does not ant the structure but the data Not B - Delay will not say much about the data but rather whether a query is valid or not Not D - Data loss is not what he/she seeks for. It's B as encoding may allow to bypass the special characters filtering.
upvoted 2 times
...
[Removed]
9 months, 2 weeks ago
Team can you confirm if this is accurate
upvoted 2 times
...
[Removed]
9 months, 2 weeks ago
Team can you confirm if this is accurate
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...