ExamGecko
Question list
Search
Search

Related questions











Question 572 - 312-50v12 discussion

Report
Export

An ethical hacker is testing the security of a website's database system against SQL Injection attacks. They discover that the IDS has a strong signature detection mechanism to detect typical SQL injection patterns.

Which evasion technique can be most effectively used to bypass the IDS signature detection while performing a SQL Injection attack?

A.
Implement case variation by altering the case of SQL statements
Answers
A.
Implement case variation by altering the case of SQL statements
B.
Employ IP fragmentation to obscure the attack payload
Answers
B.
Employ IP fragmentation to obscure the attack payload
C.
Use Hex encoding to represent the SQL query string
Answers
C.
Use Hex encoding to represent the SQL query string
D.
Leverage string concatenation to break identifiable keywords
Answers
D.
Leverage string concatenation to break identifiable keywords
Suggested answer: D

Explanation:

The most effective evasion technique to bypass the IDS signature detection while performing a SQL Injection attack is to leverage string concatenation to break identifiable keywords. This technique involves splitting SQL keywords or operators into smaller parts and joining them with string concatenation operators, such as '+' or '||'. This way, the SQL query can still be executed by the database engine, but the IDS cannot recognize the keywords or operators as malicious, as they are hidden within strings.For example, the hacker could replace the keyword 'OR' with 'O'||'R' or 'O'+'R' in the SQL query, and the IDS would not be able to match the signature of a typical SQL injection pattern12.

The other options are not as effective as option D for the following reasons:

A) Implement case variation by altering the case of SQL statements: This option is not effective because most SQL engines and IDS systems are case-insensitive, meaning that they treat SQL keywords and operators the same regardless of their case.Therefore, altering the case of SQL statements would not help evade the IDS signature detection, as the IDS would still be able to match the signature of a typical SQL injection pattern3.

B) Employ IP fragmentation to obscure the attack payload: This option is not applicable because IP fragmentation is a network-level technique that splits IP packets into smaller fragments to fit the maximum transmission unit (MTU) of the network.IP fragmentation does not affect the content or structure of the SQL query, and it does not help evade the IDS signature detection, as the IDS would still be able to reassemble the fragments and match the signature of a typical SQL injection pattern4.

C) Use Hex encoding to represent the SQL query string: This option is not feasible because Hex encoding is a method of representing binary data in hexadecimal format, such as '0x41' for 'A'. Hex encoding does not work for SQL queries, as the SQL engine would not be able to interpret the hexadecimal values as valid SQL syntax. Moreover, Hex encoding would not help evade the IDS signature detection, as the IDS would still be able to decode the hexadecimal values and match the signature of a typical SQL injection pattern.

1: SQL Injection Evasion Detection - F5

2: Mastering SQL Injection with SQLmap: A Comprehensive Evasion Techniques Cheatsheet

3: SQL Injection Prevention - OWASP Cheat Sheet Series

4: IP Fragmentation - an overview | ScienceDirect Topics

: Hex Encoding - an overview | ScienceDirect Topics

asked 18/09/2024
DAVIDE MCGARR
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first