ECCouncil EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing ECSAv10 Question # 28 Topic 3 Discussion

ECCouncil EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing ECSAv10 Question # 28 Topic 3 Discussion

ECSAv10 Exam Topic 3 Question 28 Discussion:
Question #: 28
Topic #: 3

In the process of hacking a web application, attackers manipulate the HTTP requests to subvert the application authorization schemes by modifying input fields that relate to the user ID, username, access group, cost, file names, file identifiers, etc.

They first access the web application using a low privileged account and then escalate privileges to access protected resources. What attack has been carried out?


A.

XPath Injection Attack


B.

Authorization Attack


C.

Authentication Attack


D.

Frame Injection Attack


Get Premium ECSAv10 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.