PrepAway - Latest Free Exam Questions & Answers

Which of the following application attacks is used agai…

Which of the following application attacks is used against a corporate directory service where there are unknown servers on the network?

PrepAway - Latest Free Exam Questions & Answers

A.
Rogue access point

B.
Zero day attack

C.
Packet sniffing

D.
LDAP injection

Explanation:
A directory service is accessed by using LDAP (Lightweight Directory Access Protocol). LDAP injection is an attack against a directory service.
Just as SQL injection attacks take statements that are input by users and exploit weaknesses within, an LDAP injection attack exploits weaknesses in LDAP
(Lightweight Directory Access Protocol) implementations. This can occur when the user’s input is not properly filtered, and the result can be executed commands,
modified content, or results returned to unauthorized queries. The best way to prevent LDAP injection attacks is to filter the user input and to use a validation
scheme to make certain that queries do not contain exploits. One of the most common uses of LDAP is associated with user information. Numerous applications
exist–such as employee directories–where users find other users by typing in a portion of their name. These queries are looking at the cn value or other fields
(those defined for department, home directory, and so on). Someone attempting LDAP injection could feed unexpected values to the query to see what results are
returned. All too often, finding employee information equates to finding usernames and values about those users that could be portions of their passwords.
Incorrect Answers:
A: A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network
administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack. Rogue access points of the first kind can pose a security threat to large
organizations with many employees, because anyone with access to the premises can install (maliciously or non-maliciously) an inexpensive wireless router that
can potentially allow access to a secure network to unauthorized parties. Rogue access points of the second kind target networks that do not employ mutual
authentication (client-server server-client) and may be used in conjunction with a rogue RADIUS server, depending on security configuration of the target network.
Rogue access points are not used for application attacks used against a corporate directory service. Therefore this answer is incorrect.
B: A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes
aware and hurries to fix it –this exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware, spyware or allowing unwanted access
to user information. The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability
becomes known, a race begins for the developer, who must protect users. A zero day attack is generally not used for application attacks against a corporate
directory service. Therefore this answer is incorrect.

C: Packet sniffing is the process of intercepting data as it is transmitted over a network. A sniffer (packet sniffer) is a tool that intercepts data flowing in a network. If
computers are connected to a local area network that is not filtered or switched, the traffic can be broadcast to all computers contained in the same segment. This
doesn’t generally occur, since computers are generally told to ignore all the comings and goings of traffic from other computers. However, in the case of a sniffer,
all traffic is shared when the sniffer software commands the Network Interface Card (NIC) to stop ignoring the traffic. Packet sniffing is not used for application
attacks against a corporate directory service. Therefore this answer is incorrect.

C Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, pp 336-337
http://en.wikipedia.org/wiki/Rogue_access_point
http://www.pctools.com/security-news/zero-day-vulnerability/ http://www.techopedia.com/definition/4113/sniffer


Leave a Reply