BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam ECSAv10 Topic 6 Question 79 Discussion

Actual exam question for Eccouncil's ECSAv10 exam
Question #: 79
Topic #: 6
[All ECSAv10 Questions]

SQL injection attacks are becoming significantly more popular amongst hackers and there has been an estimated 69 percent increase of this attack type.

This exploit is used to great effect by the hacking community since it is the primary way to steal sensitive data from web applications. It takes advantage of non-validated input vulnerabilities to pass SQL commands through a web application for execution by a back-end database.

The below diagram shows how attackers launched SQL injection attacks on web applications.

Which of the following can the attacker use to launch an SQL injection attack?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Oneida
26 days ago
Ha, SQL injection? That's like the hackers' version of a 'get out of jail free' card, am I right? I'm gonna have to go with D - 'Blah' or 1=1 --'. Seems like the most, uh, 'elegant' solution to me.
upvoted 0 times
...
Thea
29 days ago
Ooh, this is a tricky one. I'm gonna have to go with C - 'Blah' and 1=1 --'. It just seems like the most logical choice to me. Though, I have to admit, I'm kinda jealous of those hackers who get to play with all this cool stuff.
upvoted 0 times
Lenny
14 days ago
Antonio: Definitely, hackers are getting more creative with these attacks.
upvoted 0 times
...
Antonio
21 days ago
Yeah, that makes sense. It's a common SQL injection tactic.
upvoted 0 times
...
Michael
23 days ago
I think C is the right choice too. 'Blah' and 1=1 --'
upvoted 0 times
...
...
Chauncey
1 months ago
SQL injection, huh? Sounds like something a hacker would use to mess with a website. I'd go with option B - 'Blah' and 2=2 --'. Feels like the most straightforward way to sneak past those security checks.
upvoted 0 times
...
Lauran
2 months ago
I believe the attacker can use options A, B, C, and D to launch an SQL injection attack.
upvoted 0 times
...
Angelo
2 months ago
Ah, good ol' SQL injection! I remember learning about this in my cybersecurity class. The answer's gotta be D - 'Blah' or 1=1 --'. That's the classic way to exploit those non-validated inputs.
upvoted 0 times
Casie
12 days ago
Ah, good ol' SQL injection! I remember learning about this in my cybersecurity class. The answer's gotta be D - 'Blah' or 1=1 --'. That's the classic way to exploit those non-validated inputs.
upvoted 0 times
...
Elena
13 days ago
D) Blah' or 1=1 --
upvoted 0 times
...
Lorrine
24 days ago
C) Blah' and 1=1 --
upvoted 0 times
...
Arminda
26 days ago
B) Blah' and 2=2 --
upvoted 0 times
...
Tonja
1 months ago
A) Blah' ''2=2 --''
upvoted 0 times
...
...
Karl
2 months ago
I agree, they can lead to a lot of sensitive data being stolen.
upvoted 0 times
...
Jarod
2 months ago
I think SQL injection attacks are really dangerous.
upvoted 0 times
...

Save Cancel