ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 11 - ECSS discussion

Report
Export

Kevin, an attacker, is attempting to compromise a cloud server. In this process, Kevin intercepted the SOAP messages transmitted between a user and the server, manipulated the body of the message, and then redirected it to the server as a legitimate user to gain access and run malicious code on the cloud server.

Identify the attack initiated by Kevin on the target cloud server.

A.

Side-channel attack

Answers
A.

Side-channel attack

B.

Wrapping attack

Answers
B.

Wrapping attack

C.

Cross guest VM breaches

Answers
C.

Cross guest VM breaches

D.

DNS spoofing

Answers
D.

DNS spoofing

Suggested answer: B

Explanation:

The attack described involves intercepting and manipulating SOAP messages, which is characteristic of a wrapping attack. In a wrapping attack, the attacker intercepts the SOAP message and alters the body content to perform unauthorized actions, such as running malicious code on the server. This type of attack exploits the XML signature or encryption of SOAP messages, allowing the attacker to impersonate a legitimate user and gain unauthorized access.

asked 24/10/2024
Vaniko Batiashvili
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first