Bill is attempting a series of SQL queries in order to map out the tables within the database that he
is trying to exploit.
Choose the attack type from the choices given below.
A.
Database Fingerprinting
B.
Database Enumeration
C.
SQL Fingerprinting
D.
SQL Enumeration
Explanation:
He is trying to create a view of the characteristics of the target database,he is taking
it’s fingerprints
A
Looks more like enumerating the tables of the database than fingerprinting the database (Oracle, Sybase, Microsoft, MySQL, Maria DB etc)