New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 176 Topic 18 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 176 Topic 18 Discussion

312-50v13 Exam Topic 18 Question 176 Discussion:
Question #: 176
Topic #: 18

An ethical hacker is hired to evaluate the defenses of an organization's database system which is known to employ a signature-based IDS. The hacker knows that some SQL Injection evasion techniques may allow him

to bypass the system's signatures. During the operation, he successfully retrieved a list of usernames from the database without triggering an alarm by employing an advanced evasion technique. Which of the following

could he have used?


A.

Utilizing the char encoding function to convert hexadecimal and decimal values into characters that pass-through SQL engine parsing


B.

Using the URL encoding method to replace characters with their ASCII codes in hexadecimal form


C.

Implementing sophisticated matches such as “OR ‘john' = john" in place of classical matches like "OR 1-1"


D.

Manipulating white spaces in SQL queries to bypass signature detection


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.