which of the following tests is the source code of the application tested in a non-runtime environment to detect the SQL injection vulnerabilities?

SQL injection attack consists of insertion or “injection” of either a partial or complete SQL
query via the data input or transmitted from the client (browser) to the web application.
A successful SQL injection attack can:
i)Read sensitive data from the database
iii)Modify database data (insert/update/delete)
iii)Execute administration operations on the database (such as shutdown the DBMS)
iV)Recover the content of a given file existing on the DBMS file system or write files into the
file system
v)Issue commands to the operating system

Pen tester needs to perform various tests to detect SQL injection vulnerability. He has to
make a list of all input fields whose values could be used in crafting a SQL query, including
the hidden fields of POST requests and then test them separately, trying to interfere with the
query and to generate an error. In which of the following tests is the source code of the
application tested in a non-runtime environment to detect the SQL injection vulnerabilities?

SQL injection attack consists of insertion or “injection” of either a partial or complete SQL
query via the data input or transmitted from the client (browser) to the web application.
A successful SQL injection attack can:
i)Read sensitive data from the database
iii)Modify database data (insert/update/delete)
iii)Execute administration operations on the database (such as shutdown the DBMS)
iV)Recover the content of a given file existing on the DBMS file system or write files into the
file system
v)Issue commands to the operating system

Pen tester needs to perform various tests to detect SQL injection vulnerability. He has to
make a list of all input fields whose values could be used in crafting a SQL query, including
the hidden fields of POST requests and then test them separately, trying to interfere with the
query and to generate an error. In which of the following tests is the source code of the
application tested in a non-runtime environment to detect the SQL injection vulnerabilities?

A.
Automated Testing

B.
Function Testing

C.
Dynamic Testing

D.
Static Testing

Explanation:

Reference:
http://ijritcc.org/IJRITCC%20Vol_2%20Issue_5/Removal%20of%20Data%20Vulnerabilities%
20Using%20SQL.pdf



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Ali

Ali

D ECSA v8 page 614

Naveen Kumar

Naveen Kumar

D according to ECSAv8