Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 109 Topic 11 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 109 Topic 11 Discussion

312-50v13 Exam Topic 11 Question 109 Discussion:
Question #: 109
Topic #: 11

A penetration tester identifies that a web application's login form is not using secure password hashing mechanisms, allowing attackers to steal passwords if the database is compromised. What is the best approach to exploit this vulnerability?


A.

Perform a dictionary attack using a list of commonly used passwords against the stolen hash values


B.

Input a SQL query to check for SQL injection vulnerabilities in the login form


C.

Conduct a brute-force attack on the login form to guess weak passwords


D.

Capture the login request using a proxy tool and attempt to decrypt the passwords


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.