exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 296 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 296
Topic #: 1
[All 312-50v11 Questions]

What type of a vulnerability/attack is it when the malicious person forces the user's browser to send an authenticated request to a server?

  • A. Session hijacking
  • B. Server side request forgery
  • C. Cross-site request forgery
  • D. Cross-site scripting
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Scryptic
Highly Voted 2 years, 1 month ago
Please don't say 'correct', no one knows you
upvoted 15 times
...
ANDRESCB1988
Highly Voted 2 years, 3 months ago
correct
upvoted 5 times
...
tomorrow9151
Most Recent 1 year ago
Selected Answer: C
The answer is C
upvoted 1 times
...
Daniel8660
1 year ago
Selected Answer: C
Web Application Threats - Cross-Site Request Forgery (CSRF) Attack also known as a one-click attack, occurs when a hacker instructs a user’s web browser to send a request to the vulnerable website through a malicious web page.The victim holds an active session with a trusted site and simultaneously visits a malicious site, which injects an HTTP request for the trusted site into the victim user’s session. (P.1799/1783)
upvoted 3 times
...
dinonino
1 year, 1 month ago
authenticated request.. CSRF
upvoted 3 times
...
volatile
1 year, 4 months ago
Selected Answer: C
Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf) or XSRF, is a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts. There are many ways in which a malicious website can transmit such commands; specially-crafted image tags, hidden forms, and JavaScript XMLHttpRequests, for example, can all work without the user's interaction or even knowledge. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser. In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end user's account.
upvoted 3 times
...
freho
1 year, 4 months ago
Selected Answer: C
SSRF are not even covered by module 14 - web server attacks!? https://owasp.org/www-community/attacks/Server_Side_Request_Forgery -> It´s a direct attack on the Webserver, no "victims browser" is part of that attack
upvoted 1 times
...
Gerasz87
1 year, 6 months ago
Selected Answer: B
I think the "B" (SSRF) would be the correct answer here. "Cross-Site Request Forgery and Server-Side Request Forgery both exploit the webserver. However, only SSRF exploits are actually designed to attack the target. The target of a CSRF attack is the user. While it is accomplished using flaws in how the web application is designed, its purpose is to perform legitimate but unauthorized actions on the user’s account with the web-based service. SSRF forgery, on the other hand, is designed to primarily target the server. While, in the long run, the attack may affect users of the service, the primary purpose of the attack is theft of sensitive information on the server or exploiting other vulnerabilities by using SSRF to bypass input validation countermeasures." https://resources.infosecinstitute.com/topic/the-difference-between-cross-site-and-server-side-request-forgery/
upvoted 1 times
josevirtual
10 months, 2 weeks ago
For SSRF the attacker sends the request with a crafted code, but not related to the authentication, this is a key word. For CSRF, the user sends the request with the malicious code after the attacker tricked him or her. This is the valid answer.
upvoted 1 times
...
...
nick526
1 year, 8 months ago
Selected Answer: C
C C C C C
upvoted 3 times
...
KumaraRashu
1 year, 8 months ago
page 1799 CEHv11
upvoted 3 times
...
egz21
1 year, 9 months ago
Selected Answer: B
is B the correct Answer: https://www.microfocus.com/documentation/silk-performer/195/en/silkperformer-195-webhelp-en/GUID-FEFE9379-8382-48C7-984D-55D98D6BFD37.html
upvoted 1 times
...
egz21
1 year, 9 months ago
I attach , the explanation . I agree the answer thats correct!!! https://www.welivesecurity.com/la-es/2015/04/21/vulnerabilidad-cross-site-request-forgery-csrf/
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago