ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 52 - ECSS discussion

Report
Export

Bruce, a professional hacker, targeted an OT network. He initiated a looping strategy to recover the password of the target system. He started sending one character at a time to check whether the first character entered is correct: If so, he continued the loop for consecutive characters. Using this technique. Bruce identified how much time the device takes to finish one complete password authentication process, through which he determined the correct characters in the target password.

Identify the type of attack launched by Bruce on the target OT network.

A.

Code injection attack

Answers
A.

Code injection attack

B.

Buller overflow attack

Answers
B.

Buller overflow attack

C.

Reconnaissance attack

Answers
C.

Reconnaissance attack

D.

Side-channel attack

Answers
D.

Side-channel attack

Suggested answer: D

Explanation:

Bruce's strategy of sending one character at a time and measuring the time it takes for the device to complete the password authentication process is characteristic of aside-channel attack. In side-channel attacks, attackers exploit information leaked during the execution of cryptographic algorithms or other security protocols. In this case, the timing information provides clues about the correct characters in the password.

EC-Council Certified Security Specialist (E|CSS) documents and study guide.

EC-Council Certified Security Specialist (E|CSS) course materials.

asked 24/10/2024
MOHAMED BEN SLIMEN
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first