Which SQL function can be used to read the contents of a file during manual exploitation of the SQL injection vulnerability in a MySQL database?
SQL injection vulnerabilities allow attackers to manipulate database queries, potentially accessing unauthorized data, including file contents, if the database supports such operations. In MySQL, the LOAD_FILE() function is specifically designed to read the contents of a file on the server where the database is hosted, provided the file exists, the database user has appropriate privileges (e.g., FILE privilege), and the file is readable. For example, SELECT LOAD_FILE('/etc/passwd') could extract the contents of the /etc/passwd file if exploitable.
Option A ('READ_FILE()'): This is not a valid MySQL function.
Option B ('LOAD_FILE()'): This is the correct function for reading file contents in MySQL, making it the right choice for exploitation.
Option C ('FETCH_FILE()'): This is not a recognized MySQL function.
Option D ('GET_FILE()'): This is also not a valid MySQL function.
The correct answer is B, aligning with the CAP syllabus under 'SQL Injection' and 'Database Security.'
Melita
1 day agoJanessa
7 days agoSharita
12 days agoIdella
17 days agoSheridan
22 days agoJosephine
27 days agoLynsey
2 months agoShad
2 months agoEleni
2 months agoAide
2 months agoGennie
2 months agoKrystina
2 months agoDominque
3 months agoLettie
3 months agoShay
3 months agoTonja
3 months agoAleisha
3 months agoFletcher
3 months agoMalcom
4 months agoKelvin
4 months agoNikita
4 months agoShaquana
5 months agoDino
5 months agoDoyle
4 months agoMichel
4 months ago