Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-82 Topic 5 Question 30 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 30
Topic #: 5
[All 212-82 Questions]

A web application www.movieabc.com was found to be prone to SQL injection attack. You are given a task to exploit the web application and fetch the user credentials. Select the UID which is mapped to user john in the database table.

Note:

Username: sam

Pass: test

Show Suggested Answer Hide Answer
Suggested Answer: B

The number of files in the ''Sensitive Corporate Documents'' folder is 4. This can be verified by initiating a remote connection to the target machine from the ''Attacker Machine-1'' using Theef client. Theef is a Remote Access Trojan (RAT) that allows an attacker to remotely control a victim's machine and perform various malicious activities. To connect to the target machine using Theef client, one can follow these steps:

Launch Theef client from Z:CCT-ToolsCCT Module 01 Information Security Threats and VulnerabilitiesRemote Access Trojans (RAT)Theef on the ''Attacker Machine-1''.

Enter the IP address of the target machine (20.20.10.26) and click on Connect.

Wait for a few seconds until a connection is established and a message box appears saying ''Connection Successful''.

Click on OK to close the message box and access the remote desktop of the target machine.

Navigate to the Documents directory and locate the ''Sensitive Corporate Documents'' folder.

Open the folder and count the number of files in it. The screenshot below shows an example of performing these steps: Reference: [Theef Client Tutorial], [Screenshot of Theef client showing remote desktop and folder]


Contribute your Thoughts:

Vallie
29 days ago
I got this. Time to channel my inner John Wick and take down this SQL injection vulnerability!
upvoted 0 times
Audra
2 days ago
C) 2
upvoted 0 times
...
Stevie
3 days ago
B) 3
upvoted 0 times
...
Jose
9 days ago
A) 5
upvoted 0 times
...
...
Wenona
1 months ago
Haha, 'movieabc.com'? Really? They couldn't come up with a more creative name for the website?
upvoted 0 times
Sharee
2 days ago
B) 3
upvoted 0 times
...
Merrilee
4 days ago
B) 3
upvoted 0 times
...
Lorriane
28 days ago
A) 5
upvoted 0 times
...
Rebbeca
1 months ago
A) 5
upvoted 0 times
...
...
Audrie
1 months ago
Wait, we're supposed to exploit the web app? That's like hacking, right? I don't think I'm comfortable with that.
upvoted 0 times
...
Stefany
2 months ago
This is a classic SQL injection question. I'm pretty sure the answer is C. 2.
upvoted 0 times
Kimbery
9 days ago
I agree, the answer is C) 2
upvoted 0 times
...
Xochitl
10 days ago
I think it's C) 2
upvoted 0 times
...
Beckie
13 days ago
D) 4
upvoted 0 times
...
Emelda
15 days ago
C) 2
upvoted 0 times
...
Keneth
19 days ago
B) 3
upvoted 0 times
...
Arthur
1 months ago
A) 5
upvoted 0 times
...
...
Arlie
2 months ago
I'm not sure, but I think the answer is C) 2 because it could be an older UID assigned to user john.
upvoted 0 times
...
Lezlie
2 months ago
I disagree, I believe the answer is D) 4 because it might be the next sequential UID after user john.
upvoted 0 times
...
Moira
2 months ago
I think the answer is B) 3 because it seems like a common UID for the user john.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77