312-49 · Question #18
312-49 Question #18: Real Exam Question with Answer & Explanation
The correct answer is A: Word wrap abuse attack. A Word Wrap Abuse Attack exploits log viewers and parsers by injecting excessive white space or padding characters to force unusual line breaks or hide malicious entries within log files. This can make log analysis tools misrepresent the data or cause investigators to overlook in
Question
Which of the following log injection attacks uses white space padding to create unusual log entries?
Options
- AWord wrap abuse attack
- BHTML injection attack
- CTerminal injection attack
- DTimestamp injection attack
Explanation
A Word Wrap Abuse Attack exploits log viewers and parsers by injecting excessive white space or padding characters to force unusual line breaks or hide malicious entries within log files. This can make log analysis tools misrepresent the data or cause investigators to overlook injected content. HTML injection attacks insert HTML tags into logs, Terminal injection attacks use ANSI escape codes to manipulate terminal-based log viewers, and Timestamp injection attacks forge or manipulate timestamps in log entries — none of these rely specifically on white space padding.
Topics
Community Discussion
No community discussion yet for this question.