ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 124 Topic 13 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 124 Topic 13 Discussion

312-50v13 Exam Topic 13 Question 124 Discussion:
Question #: 124
Topic #: 13

An ethical hacker is testing the security of a website's database system against SQL Injection attacks. They discover that the IDS has a strong signature detection mechanism to detect typical SQL injection patterns.

Which evasion technique can be most effectively used to bypass the IDS signature detection while performing a SQL Injection attack?


A.

Implement case variation by altering the case of SQL statements


B.

Employ IP fragmentation to obscure the attack payload


C.

Use Hex encoding to represent the SQL query string


D.

Leverage string concatenation to break identifiable keywords


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.