Question: You are a security professional and have created a completely new malware and you are testing it. You want to detect and identify the malware

  1. You are a security professional and have created a completely new malware and you are testing it. You want to detect and identify the malware and what changes it did. What detection methods would you use (select all that apply)?
  1. Heuristic scanning
  2. Signature-based scanning
  3. Host-based scanning
  4. Network-based scanning

  1. Read the link (https://portswigger.net/kb/issues/00100210_sql-injection-second-order) and answer the following: The commonly employed mitigations for Second-order SQLi that are at least partially effective are:
  1. Using parameterized queries
  2. Validation of the result after executing the SQL query
  3. Doubling up the single quotes in user input

  1. You are a world-famous SQL database hacker. You are tasked by a service provider to measure the security of their database which is also connected to a car rental web application. The application seems to directly paste user input from the login page inside the query. Which of the following statements (when executed in the backend) would list all users in the database?
  1. select * from RENTAL_DB_USERS where username=admin and password=admin
  2. select * from RENTAL_DB_USERS where username=admin or 1=1 -- and password=admin
  3. select * from RENTAL_DB_USERS where username=admin and password=admin or 1=1 --
  4. select * from RENTAL_DB_USERS where username=admin or 1=1 and password=admin
  5. None of the above

  1. Which of the following is/are TRUE for a rootkit? (select all that apply)
  1. A rootkit tries to propagate into the network after successful infection of a host
  2. Rootkits do not try to conceal themselves
  3. They modify the OS code and can be used to hide other malware from users
  4. All of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!