PrepAway - Latest Free Exam Questions & Answers

Which of the following attacks is being attempted?

An administrator discovers the following log entry on a server.
Nov 12 2013 00:23:45 httpd[2342]: /app2/prod/process.php?input=change.cd%20./././ect:
cat%20shadow
Which of the following attacks is being attempted?

PrepAway - Latest Free Exam Questions & Answers

A.
Command injection

B.
Password attack

C.
Buffer overflow

D.
Cross-site scripting

One Comment on “Which of the following attacks is being attempted?

  1. trunguonglua says:

    Tricky question since the two commands: “change cd” to the /etc folder and “cat” the shadow file which stores passwords are injected in the input field of a http deamon (buffer overflow attack type) in order to display the password file.

    Not sure what is the correct one. A or C but not B since password attack are brute force, dictionary, and key logger.




    0



    0

Leave a Reply