Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 390 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 390
Topic #: 1
[All 312-50v11 Questions]

Calvin, a grey-hat hacker, targets a web application that has design flaws in its authentication mechanism. He enumerates usernames from the login form of the web application, which requests users to feed data and specifies the incorrect field in case of invalid credentials. Later, Calvin uses this information to perform social engineering.
Which of the following design flaws in the authentication mechanism is exploited by Calvin?

  • A. Password reset mechanism
  • B. Insecure transmission of credentials
  • C. User impersonation
  • D. Verbose failure messages
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
lawbut2
Highly Voted 3 years ago
D. Verbose failure messages p1848 Username Enumeration Attackers can enumerate usernames in two ways: verbose failure messages and predictable usernames. o Verbose Failure Message In a typical login system, the user enters two fields, namely username and password. In some cases, an application will ask for additional information. If the user is trying to log in and fails, it implies that at least one field was incorrect. This provides grounds for an attacker to exploit the application. Examples: Account <username> not found Incorrect password provided Account <username> has been locked out
upvoted 14 times
...
sunce12
Most Recent 5 months, 1 week ago
D. Verbose failure messages
upvoted 1 times
...
victorfs
1 year, 6 months ago
Selected Answer: D
The correct option is D. Verbose failure messages
upvoted 2 times
...
nuomi
1 year, 8 months ago
Verbose failure messages. Password reset mechanism is neutral and required for the whole auth mngt cycle, not a flaw.
upvoted 1 times
...
josevirtual
1 year, 10 months ago
Selected Answer: D
Verbose failure messages
upvoted 1 times
...
Daniel8660
2 years, 1 month ago
Selected Answer: D
Attack Authentication Mechanism - Username Enumeration Exploit design and implementation flaws in web applications, such as failure to check password strength or insecure transmission of credentials, to bypass authentication mechanisms. verbose failure messages - In a typical login system, the user enters two fields, namely username and password. In some cases, an application will ask for additional information.
 (P.1864/1848)
upvoted 3 times
...
sergiet
2 years, 1 month ago
Selected Answer: A
A - I think password reset mechanism
upvoted 1 times
...
MMtc
2 years, 4 months ago
Selected Answer: A
The mechanism is the password reset. "Generating the verbose error, specifying if the username is valid" from the CEH book p1867 Verbose failure message is the way he get information.
upvoted 1 times
...
pyw
2 years, 5 months ago
Selected Answer: D
verbose error
upvoted 1 times
...
giorgipirveli
2 years, 6 months ago
Selected Answer: D
D is correct answer
upvoted 1 times
...
mileke2
2 years, 6 months ago
Selected Answer: D
The answer is D
upvoted 1 times
...
egz21
2 years, 10 months ago
Selected Answer: D
is D. Verbose failure messages
upvoted 1 times
...
egz21
2 years, 10 months ago
Selected Answer: D
in my opinion the correct answer is D) Verbose failure messages
upvoted 1 times
...
Chaoticda
2 years, 11 months ago
VERBOSE FAILURE MESSAGES: ANY LOGIN FORM OF AN APPLICATION REQUESTS USERS TO FEED AT LEAST TWO FIELDS, NAMELY USERNAME AND PASSWORD. A FEW APPLICATIONS MAY ALSO ASK FOR ADDITIONAL PARAMETERS SUCH AS DOB, ANSWER TO A SECURITY QUESTION, AND OTP PIN, TO VALIDATE A USER. IF THE LOGIN ATTEMPT IS UNSUCCESSFUL, THE APPLICATION INDICATES THAT THE INFORMATION PROVIDED IS NOT VALID. >>>>>>>>>>WHEN THE APPLICATION SPECIFIES WHICH FIELD IS INCORRECT OR POPS UP REASONS FOR DENYING ACCESS, ATTACKERS CAN EASILY EXPLOIT THAT FIELD BY TRYING A LARGE SET OF SIMILAR NAMES OR WORDS TO ENUMERATE VALID DATA REQUIRED TO ACCESS THE APPLICATION. >>>>>>THE LIST OF ENUMERATED DATA CAN ALSO BE USED LATER FOR SOCIAL ENGINEERING
upvoted 3 times
...
Unitel21
2 years, 12 months ago
D. Is the correct answer.
upvoted 2 times
...
blacksheep6r
3 years, 1 month ago
Most authentication mechanisms used by web applications have design flaws. Attackers can identify these flaws and exploit them to gain unauthorized access to the web application. Such design flaws include failure to check password strength, insecure transmission of credentials over the Internet, etc. Web applications usually authenticate their clients or users by a combination of a username and password, which can be identified and exploited.  Username Enumeration Attackers can enumerate usernames in two ways: verbose failure messages and predictable usernames. o Verbose Failure Message In a typical login system, the user enters two fields, namely username and password. In some cases, an application will ask for additional information. If the user is trying to log in and fails, it implies that at least one field was incorrect. This provides grounds for an attacker to exploit the application.
upvoted 3 times
...
LoneStarChief
3 years, 1 month ago
The correct answer is D. Verbose failure messages as per the CEH book, Module 14 Page 1848, If the user is trying to log in and fails, it implies that at least one field was incorrect. This provides grounds for an attacker to exploit the application. Password reset mechanism is a password cracking tool, hence why I believe 'D' is the correct answer to this question.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...