Free 312-50v11 Exam Braindumps (page: 68)

Page 68 of 127

Sam, a professional hacker. targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS 1AM credentials and further compromise the employee's account. What is the technique used by Sam to compromise the AWS IAM credentials?

  1. Social engineering
  2. insider threat
  3. Password reuse
  4. Reverse engineering

Answer(s): A

Explanation:

Just like any other service that accepts usernames and passwords for logging in, AWS users are vulnerable to social engineering attacks from attackers. fake emails, calls, or any other method of social engineering, may find yourself with an AWS users’ credentials within the hands of an attacker. If a user only uses API keys for accessing AWS, general phishing techniques could still use to gain access to other accounts or their pc itself, where the attacker may then pull the API keys for aforementioned AWS user.
With basic opensource intelligence (OSINT), it’s usually simple to collect a list of workers of an organization that use AWS on a regular basis. This list will then be targeted with spear phishing to do and gather credentials. an easy technique may include an email that says your bill has spiked 500th within the past 24 hours, “click here for additional information”, and when they click the link, they’re forwarded to a malicious copy of the AWS login page designed to steal their credentials.
An example of such an email will be seen within the screenshot below. it’s exactly like an email that AWS would send to you if you were to exceed the free tier limits, except for a few little changes. If you clicked on any of the highlighted regions within the screenshot, you’d not be taken to the official AWS web site and you’d instead be forwarded to a pretend login page setup to steal your credentials. These emails will get even more specific by playing a touch bit additional OSINT before causing them out. If an attacker was ready to discover your AWS account ID on-line somewhere, they could use methods we at rhino have free previously to enumerate what users and roles exist in your account with none logs contact on your side. they could use this list to more refine their target list, further as their emails to reference services they will know that you often use.
For reference, the journal post for using AWS account IDs for role enumeration will be found here and the journal post for using AWS account IDs for user enumeration will be found here.
During engagements at rhino, we find that phishing is one in all the fastest ways for us to achieve access to an AWS environment.



Ethical hacker jane Smith is attempting to perform an SQL injection attach. She wants to test the response time of a true or false response and wants to use a second command to determine whether the database will return true or false results for user IDs. which two SQL Injection types would give her the results she is looking for?

  1. Out of band and boolean-based
  2. Time-based and union-based
  3. union-based and error-based
  4. Time-based and boolean-based

Answer(s): D

Explanation:

Boolean-based (content-based) Blind SQLi
Boolean-based SQL Injection is an inferential SQL Injection technique that relies on sending an SQL query to the database which forces the application to return a different result depending on whether the query returns a TRUE or FALSE result.

Depending on the result, the content within the HTTP response will change, or remain the same. This allows an attacker to infer if the payload used returned true or false, even though no data from the database is returned. This attack is typically slow (especially on large databases) since an attacker would need to enumerate a database, character by character.

Time-based Blind SQLi
Time-based SQL Injection is an inferential SQL Injection technique that relies on sending an SQL query to the database which forces the database to wait for a specified amount of time (in seconds) before responding. The response time will indicate to the attacker whether the result of the query is TRUE or FALSE.

Depending on the result, an HTTP response will be returned with a delay, or returned immediately. This allows an attacker to infer if the payload used returned true or false, even though no data from the database is returned. This attack is typically slow (especially on large databases) since an attacker would need to enumerate a database character by character.


Reference:

https://www.acunetix.com/websitesecurity/sql-injection2/



In order to tailor your tests during a web-application scan, you decide to determine which web- server version is hosting the application. On using the sV flag with Nmap. you obtain the following response:
80/tcp open http-proxy Apache Server 7.1.6
What Information-gathering technique does this best describe?

  1. WhOiS lookup
  2. Banner grabbing
  3. Dictionary attack
  4. Brute forcing

Answer(s): C



Jason, an attacker, targeted an organization to perform an attack on its Internet-facing web server with the intention of gaining access to backend servers, which are protected by a firewall. In this process, he used a URL https://xyz.com/feed.php?url:externaIsile.com/feed/to to obtain a remote feed and altered the URL input to the local host to view all the local resources on the target server. What is the type of attack Jason performed In the above scenario?

  1. website defacement
  2. Server-side request forgery (SSRF) attack
  3. Web server misconfiguration
  4. web cache poisoning attack

Answer(s): B

Explanation:

Server-side request forgery (also called SSRF) is a net security vulnerability that allows an assaulter to induce the server-side application to make http requests to associate arbitrary domain of the attacker’s choosing.
In typical SSRF examples, the attacker might cause the server to make a connection back to itself, or to other web-based services among the organization’s infrastructure, or to external third-party systems.
Another type of trust relationship that often arises with server-side request forgery is where the application server is able to interact with different back-end systems that aren’t directly reachable by users. These systems typically have non-routable private informatics addresses. Since the back-end systems normally ordinarily protected by the topology, they typically have a weaker security posture. In several cases, internal back-end systems contain sensitive functionality that may be accessed while not authentication by anyone who is able to act with the systems.
In the preceding example, suppose there’s an body interface at the back-end url https://192.168.0.68/admin. Here, an attacker will exploit the SSRF vulnerability to access the executive interface by submitting the following request:
POST /product/stock HTTP/1.0
Content-Type: application/x-www-form-urlencoded Content-Length: 118 stockApi=http://192.168.0.68/admin



Page 68 of 127



Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members:

Casandra commented on December 05, 2024
Do not book your exam if you don't know the topics and the questions. The test is super duper hard and almost impossible to pass without knowing the questions.
EUROPEAN UNION
upvote

Joseph commented on December 04, 2024
VERY HELPFUL TO ME
Anonymous
upvote

aam commented on November 20, 2024
great lesson
Anonymous
upvote

Naomie commented on November 12, 2024
Good material very helpful.
Anonymous
upvote

mo commented on October 08, 2024
a good practice thanks
Anonymous
upvote

Last-Minute Miracles commented on September 21, 2024
Thanks to this exam dumps and for posting it free.
Anonymous
upvote

Yorika commented on September 14, 2024
Quite impressive and accurate. The full version is well worth it with the Buy 1 Get one free deal. Basically you get 2 exams with 50% discount.
UNITED STATES
upvote

Sunny commented on September 14, 2024
I am pleased to let you know that I passed this exam last Friday. Here are some feedback to share: 1- The exam is tough so you must read and read and prepare 2- They give you enough time. Skip the questions you don't know and come back to it at the end. 3- Use this exam dumps. I saw most these questions in the exam. Good luck.
UNITED STATES
upvote

Emmanuel Fakayode commented on September 10, 2024
This is a great deal and an eyes opener.
Anonymous
upvote

MYSTERY MASTER commented on August 15, 2024
SEEMS HELPFUL
INDIA
upvote

Mohan commented on August 07, 2024
This is one of the most compete and comprehensive exam questions and answers I have came across.
INDIA
upvote

Raks commented on May 28, 2024
No comments till now
Anonymous
upvote

Pranav commented on July 22, 2022
This site keeps its promise. The 100% pass is real. Thank you team.
UNITED STATES
upvote

Nathan commented on June 18, 2021
I bought 2 exams for the 50% sale. I already passed one of them. I am prepareing for my next exam. These exam dumps questions are very helpful.
POLAND
upvote