SY0-601 Exam QuestionsBrowse all questions from this exam

SY0-601 Exam - Question 541


A user's login credentials were recently compromised. During the investigation, the security analyst determined the user input credentials into a pop-up window when prompted to confirm the username and password. However, the trusted website does not use a pop-up for entering user credentials. Which of the following attacks occurred?

Show Answer
Correct Answer: AC

The user's login credentials were compromised after inputting them into a pop-up window that did not belong to the legitimate website. This situation strongly indicates a DNS poisoning attack. In DNS poisoning, the user is redirected to a malicious website that looks similar to the trusted site. Since the legitimate site does not use pop-up windows for credentials, it is likely that the user was on a fake site created by the attacker to harvest credentials, which aligns with DNS poisoning rather than cross-site scripting.

Discussion

15 comments
Sign in to comment
Rowdy_47Option: C
Oct 25, 2023

The question is quite vague, with the limited info we have here I would say DNS poisoning, we have no info or indication of any XSS, however "However, the trusted website does not use a pop-up for entering user credentials." which leads me to believe that the user is not on the trusted website Therefore his DNS has been poisoned and has been redirected to a malicious website Also see Q551

blockfaceOption: A
Jul 13, 2023

Seems like A. The attacker most probably used XSS to show a popup window for the user.

AmesCB
Aug 5, 2023

but the user was not on the trusted website in this scenario, so it would not be A.

shocky377
Aug 7, 2023

a trusted website could have a vulnerability that an attacker would use to insert XSS code to display a popup window and send the credentials back to the attacker

ApplebeesWaiter1122Option: A
Jul 28, 2023

The scenario described is indicative of a cross-site scripting (XSS) attack. In an XSS attack, an attacker injects malicious scripts into a trusted website, which then executes those scripts in the browsers of unsuspecting users. This can happen when the website fails to properly validate and sanitize user input, allowing the attacker to inject malicious code. In this case, the pop-up window used to collect user credentials is not a legitimate part of the trusted website's design. The attacker has injected a script that creates the pop-up and tricks the user into entering their login credentials into the fake form. The credentials are then captured and sent to the attacker, compromising the user's account. To prevent XSS attacks, web applications should implement proper input validation and output encoding to ensure that user-supplied data is treated as data and not executable code. Additionally, using security mechanisms like Content Security Policy (CSP) and sanitizing user input can help protect against XSS vulnerabilities.

je123
Aug 16, 2023

I find it weird that the attacker needs to create a pop-up to ask the user to re-enter his credentials when he could have just exfiltrated the credentials inputted into the vulnerable field in the first place. Its as though he is pulling down his pants just to fart. Reference (for scraping credentials with XSS): https://www.trustedsec.com/blog/scraping-login-credentials-with-xss/

[Removed]Option: A
Aug 10, 2023

a simple javascript prompt(); function may do the pop-up, answer A: XSS attack

stinkleOption: C
Aug 2, 2023

This is a re-worded question from another. I believe it to be DNS poisoning - fake website redirection is classic dns poisoning

Abdul2107
Aug 25, 2023

Guys, I have an exam on 27-Aug-2023, if this question comes, I try to inform you if it has the same wording as here or not. seems we need more wording to decide A to C.

CS3000
Aug 26, 2023

GL chap!

david124
Aug 30, 2023

how was the exam

pachosinfortunaOption: B
Jul 23, 2023

It is most probable be DNS poisoning. The user was redirected to a fake site that mimic the original site. User is asked to provide credentials.

pachosinfortuna
Jul 23, 2023

I meant C

AmesCBOption: C
Aug 5, 2023

the comment ' the trusted website does not use a pop-up for entering user credentials' would mean that the victim was not on the original website, which would mean that C makes the most sense.

shocky377Option: A
Aug 7, 2023

DNS poisoning redirects you to a fake website by altering your DNS cache. Since the user was on the trusted website it cannot be C. DNS poisoning. The answer is A. XSS, which is when an attacker injects code into a trusted website with a vulnerability so that when users access the website the attacker's code is run. In this case an attacker had code to display a popup window on the trusted website whenever someone accessed it

je123
Aug 16, 2023

" Since the user was on the trusted website " this is your assumption, which was not stated in the question. Also, I find it weird that the attacker needs to create a pop-up to ask the user to re-enter his credentials when he could have just exfiltrated the credentials inputted into the vulnerable field in the first place. Its as though he is pulling down his pants just to fart. Reference (for scraping credentials with XSS): https://www.trustedsec.com/blog/scraping-login-credentials-with-xss/

je123Option: C
Aug 16, 2023

its just my opinion that Comptia deliberately made things complicated by not providing enough information for us to make a choice. By choosing A. XSS, we are assuming that the user indeed tried to log in using the legitimate webpage (i.e. there was no dns poisoning). also, it seems like we are making assumption that it is stored XSS instead of reflected xss since no hints were given towards reflected xss which requires users to click on link to legitimate but vulnerable webpage embedded with malicious script in the input field. By choosing C. DNS poisoning, we are making the opposite assumption. I feel like Comptia did us dirty here if in fact this is the actual question. there is too much ambiguity in the question that we can really argue it to be A or C. But I really hope I am missing something here and that someone can enlighten me..

je123
Aug 16, 2023

Maybe A.. Specific Mention of Pop-up Window: The question explicitly states that the user inputted credentials into a pop-up window. DNS poisoning typically involves redirecting users to malicious websites by altering DNS records, which might not always involve pop-up windows for credential input. Focus on User Interaction: The scenario seems to emphasize the user's direct interaction with a pop-up window. DNS poisoning, on the other hand, usually redirects users to a fake website without their direct initiation of a pop-up window or interaction with the site. Lack of Indication: The question does not provide any indication that the user was redirected to a different website or experienced unexpected behavior in their browser, which are common signs of DNS poisoning.

[Removed]Option: A
Oct 28, 2023

Yes, the website was safe, but what about the browser?

rline63
Sep 7, 2023

A and C both seem like great answers, I'm so confused

fercho2023Option: A
Oct 16, 2023

Correct Answer is A. Here is the link the documents it. https://brutelogic.com.br/blog/xss101/

Pr0noobOption: A
Jan 16, 2024

Would go with A

JasonMunozOption: A
Jul 14, 2024

The attack that occurred in this scenario is Cross-site scripting (XSS). In an XSS attack, malicious code is injected into a web application, often via user input fields. In this case, the pop-up window tricked the user into revealing their credentials on a fake site.

JasonMunoz
Jul 14, 2024

DNS poisoning doesn’t involve pop-up windows or tricking users directly.