List of questions
Related questions
Question 570 - 312-50v12 discussion
An ethical hacker is hired to evaluate the defenses of an organization's database system which is known to employ a signature-based IDS. The hacker knows that some SQL Injection evasion techniques may allow him to bypass the system's signatures. During the operation, he successfully retrieved a list of usernames from the database without triggering an alarm by employing an advanced evasion technique. Which of the following could he have used?
A.
Utilizing the char encoding function to convert hexadecimal and decimal values into characters that pass-through SQL engine parsing
B.
Using the URL encoding method to replace characters with their ASCII codes in hexadecimal form
C.
Implementing sophisticated matches such as "OR 'john' = john' in place of classical matches like 'OR 1-1'
D.
Manipulating white spaces in SQL queries to bypass signature detection
Your answer:
0 comments
Sorted by
Leave a comment first