exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 238 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 238
Topic #: 1
[All 312-50v13 Questions]

As an IT Security Analyst, you've been asked to review the security measures of an e-commerce website that relies on a SQL database for storing sensitive customer data. Recently, an anonymous tip has alerted you to a possible threat: a seasoned hacker who specializes in SQL Injection attacks may be targeting your system. The site already employs input validation measures to prevent basic injection attacks, and it blocks any user inputs containing suspicious patterns. However, this hacker is known to use advanced SQL Injection techniques. Given this situation, which of the following strategies would the hacker most likely adopt to bypass your security measures?

  • A. The hacker might employ a 'blind' SQL Injection attack, taking advantage of the application's true or false responses to extract data bit by bit
  • B. The hacker may resort to a DDoS attack instead, attempting to crash the server and thus render the e-commerce site unavailable
  • C. The hacker may try to use SQL commands which are less known and less likely to be blocked by your system's security
  • D. The hacker could deploy an 'out-of-band' SQL Injection attack, extracting data via a different communication channel, such as DNS or HTTP requests
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
NikoTomas
1 week ago
Selected Answer: C
Answer: C - use less fequent SQL commands which are not blocked by typical SQLi filters. For example: - MAKE_SET() for string manipulation, - CHAR() / CHR() to build strings from ASCII codes, - HAVING 1=1 --> alternative to WHERE 1=1 ... CEH v12 Student Manual, SQLi Evasion Techniques: "Attackers may use lesser-known SQL statements or DBMS-specific keywords to bypass filters and gain access to backend databases." Incorrect answers: A) Extracting data bit by bit using logical true/false (i. e. 1 or 0) on output from our queries if we can't take data out directly, is possible, but it is not method how to get IN but how to get data OUT. D) OOB channel - again about getting SQLi execution signals and/or data out but this is not technique how to overcome input filters.
upvoted 1 times
...
killwitch
2 weeks, 6 days ago
Selected Answer: D
Since the e-commerce website already implements input validation and pattern-based filtering to block common SQL injection attempts, an experienced hacker will likely use advanced techniques to bypass these defenses. One such method is Out-of-Band (OOB) SQL Injection, which allows the hacker to extract data through alternate communication channels (such as DNS requests or HTTP responses) instead of relying on the application's direct database responses.
upvoted 1 times
NikoTomas
1 week ago
Both A and D are data exfiltration techiques and NOT abfuscation techniques which could be used to overcome input filters. Question is about how to get in, not out.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago