ExamGecko
Question list
Search
Search

Related questions











Question 320 - 200-201 discussion

Report
Export

Refer to the exhibit.

Which attack is being attempted against a web application?

A.

SQL injection

Answers
A.

SQL injection

B.

man-in-the-middle

Answers
B.

man-in-the-middle

C.

command injection

Answers
C.

command injection

D.

denial of service

Answers
D.

denial of service

Suggested answer: C

Explanation:

The exhibit shows an HTTP GET request with a parameter that includes ; /bin/sh -c id.

This indicates a command injection attempt, where the attacker is trying to execute shell commands on the server.

Command injection vulnerabilities allow an attacker to execute arbitrary commands on the host operating system via a vulnerable application.

The use of /bin/sh and the -c flag is typical in command injection exploits to run shell commands, such as id, which returns user identity information.

OWASP Command Injection

Analyzing HTTP Requests for Injection Attacks

Web Application Security Testing Guidelines

asked 07/10/2024
nosh shah
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first