Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-39 Topic 7 Question 72 Discussion

Actual exam question for Eccouncil's 312-39 exam
Question #: 72
Topic #: 7
[All 312-39 Questions]

Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown:

http://www.terabytes.com/process.php./../../../../etc/passwd

Show Suggested Answer Hide Answer
Suggested Answer: A


Contribute your Thoughts:

Rosio
3 days ago
Come on, this is way too obvious. It's definitely a Directory Traversal Attack. The attacker is just climbing up the directory tree to reach the sensitive /etc/passwd file.
upvoted 0 times
...
Deeanna
5 days ago
Hmm, I'm not sure. Could it be a SQL Injection Attack? Manipulating the URL to access the password file seems like a database-related issue.
upvoted 0 times
...
Shaun
7 days ago
I think this is clearly a Directory Traversal Attack. The URL manipulation allows the attacker to access restricted files outside the web root.
upvoted 0 times
...
Ceola
11 days ago
I agree with both of you, it's definitely a Directory Traversal Attack.
upvoted 0 times
...
Una
13 days ago
I think it's A too, because the URL manipulation allows the attacker to access files outside the web root directory.
upvoted 0 times
...
Cyndy
26 days ago
A) Directory Traversal Attack
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77