Which of the following was used to perform this attack?

Sara, a hacker, is completing a website form to request a free coupon. The site has a field that
limits the request to 3 or fewer coupons. While submitting the form, Sara runs an application on
her machine to intercept the HTTP POST command and change the field from 3 coupons to 30.
Which of the following was used to perform this attack?

Sara, a hacker, is completing a website form to request a free coupon. The site has a field that
limits the request to 3 or fewer coupons. While submitting the form, Sara runs an application on
her machine to intercept the HTTP POST command and change the field from 3 coupons to 30.
Which of the following was used to perform this attack?

A.
SQL injection

B.
XML injection

C.
Packet sniffer

D.
Proxy

Explanation:



Leave a Reply 6

Your email address will not be published. Required fields are marked *


DJ

DJ

This sounds more like a XML injection?

GIMBO

GIMBO

Yeah, How is a proxy server being used here?

Jairo

Jairo

Could anyone explain what would be a proxy type attack?

Viktor

Viktor

The correct answer is B – XML injection. See other versions of this exam questions.

Danielle

Danielle

I believe the application intercepting the commands is considered a proxy.

Dave

Dave

How is it an XML injection? Based on what I’ve researched, a proxy sounds like the best answer.