Exam4Training

/site/script.php?

235.62.11 [02/Mar/2014:06:13:04] "GET

/site/script.php?user=admin&pass=pass%20or%201=1 HTIP/1.1" 200 5724

Given this log, which of the following is the security administrator concerned with and which fix should be implemented by the developer?
A . The security administrator is concerned with nonprintable characters being used to gain administrative access, and the developer should strip all nonprintable characters.
B . The security administrator is concerned with XSS, and the developer should normalize Unicode characters on the browser side.
C . The security administrator is concerned with SQL injection, and the developer should implement server side input validation.
D . The security administrator is concerned that someone may log on as the administrator, and the developer should ensure strong passwords are enforced.

Answer: C

Explanation:

The code in the question is an example of a SQL Injection attack. The code ‘1=1’ will always provide a value of true. This can be included in statement designed to return all rows in a SQL table.

In this question, the administrator has implemented client-side input validation. Client-side validation can be bypassed. It is much more difficult to bypass server-side input validation. SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application’s software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.

Incorrect Answers:

A: The code in this question does not contain non-printable characters.

B: The code in this question is not an example of cross site scripting (XSS).

D: The code in this question is an example of a SQL injection attack. It is not simply someone attempting to log on as administrator.

References:

http://en.wikipedia.org/wiki/SQL_injection

Exit mobile version