ExamGecko
Question list
Search
Search

Related questions











Question 283 - 312-50v12 discussion

Report
Export

SQL injection (SQLi) attacks attempt to inject SQL syntax into web requests, which may Bypass authentication and allow attackers to access and/or modify data attached to a web application.

Which of the following SQLI types leverages a database server's ability to make DNS requests to pass data to an attacker?

A.
Union-based SQLI
Answers
A.
Union-based SQLI
B.
Out-of-band SQLI
Answers
B.
Out-of-band SQLI
C.
ln-band SQLI
Answers
C.
ln-band SQLI
D.
Time-based blind SQLI
Answers
D.
Time-based blind SQLI
Suggested answer: B

Explanation:

Out-of-band SQL injection occurs when an attacker is unable to use an equivalent channel to launch the attack and gather results. … Out-of-band SQLi techniques would believe the database server's ability to form DNS or HTTP requests to deliver data to an attacker. Out-of-band SQL injection is not very common, mostly because it depends on features being enabled on the database server being used by the web application. Out-of-band SQL injection occurs when an attacker is unable to use the same channel to launch the attack and gather results.

Out-of-band techniques, offer an attacker an alternative to inferential time-based techniques, especially if the server responses are not very stable (making an inferential time-based attack unreliable).

Out-of-band SQLi techniques would rely on the database server's ability to make DNS or HTTPrequests to deliver data to an attacker. Such is the case with Microsoft SQLServer's xp_dirtree command, which can be used to make DNS requests to a server an attackercontrols; as well as Oracle Database's UTL_HTTP package, which can be used to send HTTP requestsfrom SQL and PL/SQL to a server an attacker controls.

asked 18/09/2024
Ridwan Sulaiman
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first