178k views
2 votes
What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information? a. LDAP poisoning b. LDAP injection c. Kerberos injection d. DAP hijacking

User Karl Pokus
by
4.7k points

2 Answers

5 votes

Answer:

dap

Step-by-step explanation:

you suck 1v1 me epic Jayden rock star

User Luzmarina
by
4.0k points
4 votes

Answer: b. LDAP injection

Step-by-step explanation:

LDAP (Lightweight Directory Access Protocol ) Injection is defined as

  • an injection attack used by attacker to exploit web based applications by inserting LDAP statements based on user input.
  • It may be possible modify LDAP statements through some techniques if an application fails to properly sanitize user input.

So, LDAP injection is the attack that allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information.

Hence, the correct option is b. LDAP injection.

User Stefcud
by
5.2k points