Computer security Question:

What are some examples of you how you would attempt to gain access?

Tweet Share WhatsApp

Answer:

Note: Goal of question – Determine if the applicant has a wide knowledge of different authentication vulnerabilities. They may attempt default usernames/passwords or attempt SQL Injection queries that provide an SQL true statement (such as – ‘ OR 1=1#). If they provide SQL examples, then offer them the following Error document information and ask them what this indicates.

ODBC Error Code = 37000 (Syntax error or access violation)

[Microsoft][ODBC SQL Server Driver][SQL Server]Line 4: Incorrect syntax near '='.
Data Source = "ECommerceTheArchSupport2"
SQL = "SELECT QuickJump_Items.ItemId FROM QuickJump_Items WHERE QuickJump_Items.ItemId <> 0 AND QuickJumpId ="
The error occurred while processing an element with a general identifier of (CFQUERY), occupying document position (1:1) to (1:42) in the template file K:InetPubclientsloginhttpailment.cfm
The specific sequence of files included or processed is: K:INETPUBCLIENTSLOGINHTTPAILMENT.CFM
This error message indicates that the target web application if running Microsoft SQL and discloses directory structures.

Download Computer security PDF Read All 89 Computer security Questions
Previous QuestionNext Question
What are the most important steps you would recommend for securing a new web server? Web application?What does this log entry indicate? How could you identify what the contents are of the hacked.htm file that the attacker is trying to upload?