Sara, a hacker, is completing a website form to request a free coupon. The site has a field that
limits the request to 3 or fewer coupons. While submitting the form, Sara runs an application on
her machine to intercept the HTTP POST command and change the field from 3 coupons to 30.
Which of the following was used to perform this attack?
A.
SQL injection
B.
XML injection
C.
Packet sniffer
D.
Proxy
Explanation:
This sounds more like a XML injection?
Yeah, How is a proxy server being used here?
Could anyone explain what would be a proxy type attack?
The correct answer is B – XML injection. See other versions of this exam questions.
I believe the application intercepting the commands is considered a proxy.
How is it an XML injection? Based on what I’ve researched, a proxy sounds like the best answer.