You find a web application that uses the following query structure to authenticate users: SELECT * FROM
Question:
You find a web application that uses the following query structure to authenticate users: “SELECT * FROM userstable WHERE username 5 ‘userinput1’ and password5
‘userinput2’;” You replace userinput1 with ‘OR 151’; which gives you access to the database without having to enter a user name or password, as “151” is always true and the rest of the query is ignored. What computer fraud and abuse technique is this?
a. SQL injection
b. URL hijacking attack
c. Buffer overflow attack
d. Zero-day attack
e. Web page spoofing
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Accounting Information Systems
ISBN: 9781292220086
14th Global Edition
Authors: Marshall B. Romney, Paul John Steinbart
Question Posted: