PrepAway - Latest Free Exam Questions & Answers

What kind of attack did the Hacker attempt to carry out at the bank?

Bank of Timbuktu was a medium-sized, regional financial institution in Timbuktu. The bank has deployed a new Internet-accessible Web application recently, using which customers could access their account balances, transfer money between accounts, pay bills and conduct online financial business using a Web browser.

John Stevens was in charge of information security at Bank of Timbuktu. After one month in production, several customers complained about the Internet enabled banking application. Strangely, the account balances of many bank’s customers has been changed!

However, money hadn’t been removed from the bank. Instead, money was transferred between accounts. Given this attack profile, John Stevens reviewed the Web application’s logs and found the following entries:

Attempted login of unknown user: John

Attempted login of unknown user: sysaR

Attempted login of unknown user: sencat

Attempted login of unknown user: pete `’;

Attempted login of unknown user: ` or 1=1–

Attempted login of unknown user: `; drop table logins–

Login of user jason, sessionID= 0x75627578626F6F6B

Login of user daniel, sessionID= 0x98627579539E13BE

Login of user rebecca, sessionID= 0x90627579944CCB811

Login of user mike, sessionID= 0x9062757935FB5C64

Transfer Funds user jason

Pay Bill user mike

Logout of user mike

What kind of attack did the Hacker attempt to carry out at the bank? (Choose the best answer)

PrepAway - Latest Free Exam Questions & Answers

A.
The Hacker attempted SQL Injection technique to gain access to a valid bank login ID.

B.
The Hacker attempted Session hijacking, in which the Hacker opened an account with the bank, then logged in to receive a session ID, guessed the next ID and took over Jason’s session.

C.
The Hacker attempted a brute force attack to guess login ID and password using password cracking tools.

D.
The Hacker used a random generator module to pass results to the Web server and exploited Web application CGI vulnerability.

Explanation:
The following part:
Attempted login of unknown user: pete `’;
Attempted login of unknown user: ` or 1=1–
Attempted login of unknown user: `; drop table logins–

Clearly shows a hacker trying to perform a SQL injection by bypassing the login with the statement 1=1 and then dumping the logins table.


Leave a Reply