Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 203 Topic 21 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 203 Topic 21 Discussion

312-50v13 Exam Topic 21 Question 203 Discussion:
Question #: 203
Topic #: 21

A penetration tester is assessing a web application that uses dynamic SQL queries for searching users in the database. The tester suspects the search input field is vulnerable to SQL injection. What is the best approach to confirm this vulnerability?


A.

Input DROP TABLE users; -- into the search field to test if the database query can be altered


B.

Inject JavaScript into the search field to test for Cross-Site Scripting (XSS)


C.

Use a directory traversal attack to access server configuration files


D.

Perform a brute-force attack on the user login page to guess weak passwords


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.