Jpeirano5573 Jpeirano5573
  • 03-12-2019
  • Computers and Technology
contestada

What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information?

Respuesta :

dapman601 dapman601
  • 03-12-2019

Answer:

LDAP injection

Explanation:

LDAP injection is a kind of assault on a web application where hackers place code in a client input field with the aim of gaining unauthorized access in to the system or retrieve information.

At the point when a web application doesn't satisfactorily sanitize client provided input, hackers might have the option to change the construction of a LDAP statement which will run with similar permissions that executed the command.

Answer Link

Otras preguntas

subtracting 2x^2+4x-5 from 7x^2+x+9 results in a polynomial. after substracting 4x^2 - 3x from this polynomial, the difference is ________?​
When x=3, y=4. What is y when x=12? (The relationship is proportional). Pls help
Which explanation best describes the importance of continuing education? It is a certification requirement. It is important to stay current with advances. It is
Find the circumference of the blue circle to the nearest tenth.
Is the relationship between minutes and depth additive or multiplicative
Can someone plzzz help with this worksheet I need help with all the questions bc I’m not understanding this plzzz
-3x - y = 0 and -8x +5y=7
When an oligopoly exists, how many producers dominate the market? none one a few many
Describe young Mussolini and young Churchill.
Sorry it’s messy, but if someone could help with a Step by Step This has to do with Union and Intersection