Jpeirano5573 Jpeirano5573
  • 03-12-2019
  • Computers and Technology
contestada

What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information?

Respuesta :

dapman601 dapman601
  • 03-12-2019

Answer:

LDAP injection

Explanation:

LDAP injection is a kind of assault on a web application where hackers place code in a client input field with the aim of gaining unauthorized access in to the system or retrieve information.

At the point when a web application doesn't satisfactorily sanitize client provided input, hackers might have the option to change the construction of a LDAP statement which will run with similar permissions that executed the command.

Answer Link

Otras preguntas

(10y^3+20y^2+55y)/5y
Prove that (x^5)-(x^2)+2x +3=0 has at least one real root. Prove that x=cosx has at least one solution.
find an equivalent expression without parentheses -(50x-15y+15)=
Can someone use the word delta in a sentence
Which equation has the same y-intercept as y=4x-3?a. y-3=x              b. y=8x+3    c. 3-y=4x      d. y=-3+8xWhich of the following is the equation of the line
Data are drawn from a symmetric and bell shaped distribution with a mean of 120 and a standard deviation of 5. There are 900 observations in the data set. What
How is it possible for Mercury to have frozen ice ?
Find Domain of the functionsquare root of (x-8)/x(x-9)
Can someone use the word delta in a sentence
how is mass transit in cities a possible solution tk urban air pollution?