ECCouncil EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing ECSAv10 Question # 26 Topic 3 Discussion

ECCouncil EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing ECSAv10 Question # 26 Topic 3 Discussion

ECSAv10 Exam Topic 3 Question 26 Discussion:
Question #: 26
Topic #: 3

SQL injection attacks are becoming significantly more popular amongst hackers and there has been an estimated 69 percent increase of this attack type.

This exploit is used to great effect by the hacking community since it is the primary way to steal sensitive data from web applications. It takes advantage of non-validated input vulnerabilities to pass SQL commands through a web application for execution by a back-end database.

The below diagram shows how attackers launched SQL injection attacks on web applications.

ECSAv10 Question 26

Which of the following can the attacker use to launch an SQL injection attack?


A.

Blah' “2=2 –“


B.

Blah' and 2=2 --


C.

Blah' and 1=1 --


D.

Blah' or 1=1 --


Get Premium ECSAv10 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.