ECCouncil EC-Council Certified Security Analyst (ECSA) V10 412-79v10 Question # 51 Topic 6 Discussion

ECCouncil EC-Council Certified Security Analyst (ECSA) V10 412-79v10 Question # 51 Topic 6 Discussion

412-79v10 Exam Topic 6 Question 51 Discussion:
Question #: 51
Topic #: 6

In the process of hacking a web application, attackers manipulate the HTTP requests to subvert the application authorization schemes by modifying input fields that relate to the user ID, username, access group, cost, file names, file identifiers, etc.

They first access the web application using a low privileged account and then escalate privileges to access protected resources. What attack has been carried out?


A.

XPath Injection Attack


B.

Authorization Attack


C.

Authentication Attack


D.

Frame Injection Attack


Get Premium 412-79v10 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.