Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 77 Topic 8 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 77 Topic 8 Discussion

312-50v13 Exam Topic 8 Question 77 Discussion:
Question #: 77
Topic #: 8

A penetration tester identifies that a web application ' s login form is not using secure password hashing mechanisms, allowing attackers to steal passwords if the database is compromised. What is the best approach to exploit this vulnerability?


A.

Perform a dictionary attack using a list of commonly used passwords against the stolen hash values


B.

Input a SQL query to check for SQL injection vulnerabilities in the login form


C.

Conduct a brute-force attack on the login form to guess weak passwords


D.

Capture the login request using a proxy tool and attempt to decrypt the passwords


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.