Free 312-50v12 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEHv12) exam with these free Questions and Answers

Page 22 of 101
QUESTION 101

- (Exam Topic 3)
If executives are found liable for not properly protecting their company’s assets and information systems, what type of law would apply in this situation?

  1. A. Criminal
  2. B. International
  3. C. Common
  4. D. Civil

Correct Answer: D

QUESTION 102

- (Exam Topic 3)
An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim’s profile to a text file and then submit the data to the attacker’s database.
<
iframe src=““http://www.vulnweb.com/updateif.php”” style=““display:none””
> < /iframe >
What is this type of attack (that can use either HTTP GET or HTTP POST) called?

  1. A. Browser Hacking
  2. B. Cross-Site Scripting
  3. C. SQL Injection
  4. D. Cross-Site Request Forgery

Correct Answer: D
https://book.hacktricks.xyz/pentesting-web/csrf-cross-site-request-forgery
Cross-site request forgery (also known as CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform.
This is done by making a logged in user in the victim platform access an attacker controlled website and from there execute malicious JS code, send forms or retrieve "images" to the victims account.
In order to be able to abuse a CSRF vulnerability you first need to find a relevant action to abuse (change password or email, make the victim follow you on a social network, give you more privileges...). The session must rely only on cookies or HTTP Basic Authentication header, any other header can't be used to handle the session. An finally, there shouldn't be unpredictable parameters on the request.
Several counter-measures could be in place to avoid this vulnerability. Common defenses:
- SameSite cookies: If the session cookie is using this flag, you may not be able to send the cookie from arbitrary web sites.
- Cross-origin resource sharing: Depending on which kind of HTTP request you need to perform to abuse the relevant action, you may take int account the CORS policy of the victim site. Note that the CORS policy won't affect if you just want to send a GET request or a POST request from a form and you don't need to read the response.
- Ask for the password user to authorise the action.
- Resolve a captcha
- Read the Referrer or Origin headers. If a regex is used it could be bypassed form example with:
http://mal.net?orig=http://example.com (ends with the url) http://example.com.mal.net
(starts with the url)
- Modify the name of the parameters of the Post or Get request
- Use a CSRF token in each session. This token has to be send inside the request to confirm the action. This token could be protected with CORS.
Diagram Description automatically generated

QUESTION 103

- (Exam Topic 2)
You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c
312-50v12 dumps exhibit
What is the hexadecimal value of NOP instruction?

  1. A. 0x60
  2. B. 0x80
  3. C. 0x70
  4. D. 0x90

Correct Answer: D

QUESTION 104

- (Exam Topic 1)
env x=’(){ :;};echo exploit’ bash –c ‘cat/etc/passwd’
What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

  1. A. Removes the passwd file
  2. B. Changes all passwords in passwd
  3. C. Add new user to the passwd file
  4. D. Display passwd content to prompt

Correct Answer: D

QUESTION 105

- (Exam Topic 3)
BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are concerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented to recover the keys from Active Directory. What is this mechanism called in cryptography?

  1. A. Key archival
  2. B. Key escrow.
  3. C. Certificate rollover
  4. D. Key renewal

Correct Answer: B

Page 22 of 101

Post your Comments and Discuss EC-Council 312-50v12 exam with other Community members: