Which technique bypasses the Same Origin Policy to allow the malicious web page to communicate with local domains?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which technique bypasses the Same Origin Policy to allow the malicious web page to communicate with local domains?

Explanation:
DNS rebinding attacks exploit how DNS can change what a domain resolves to over time. A malicious page is loaded from a domain the attacker controls. Initially, the domain resolves to the attacker's server, so the page runs normally. Then the DNS for that domain is made to resolve to a local address on the victim’s network (like a router or a localhost address) after a short time. The page’s JavaScript then makes requests to that domain, but the requests actually reach a local service on the victim’s machine. Because the page’s origin remains the attacker’s domain, the browser can end up handing the local responses to the page as if they were same-origin, effectively bypassing the normal Same Origin Policy. This is how the malicious page can interact with local services (or devices) on the victim’s network. Other options don’t fit because they don’t describe a technique that changes DNS to target local IPs and bypass SOP.

DNS rebinding attacks exploit how DNS can change what a domain resolves to over time. A malicious page is loaded from a domain the attacker controls. Initially, the domain resolves to the attacker's server, so the page runs normally. Then the DNS for that domain is made to resolve to a local address on the victim’s network (like a router or a localhost address) after a short time. The page’s JavaScript then makes requests to that domain, but the requests actually reach a local service on the victim’s machine. Because the page’s origin remains the attacker’s domain, the browser can end up handing the local responses to the page as if they were same-origin, effectively bypassing the normal Same Origin Policy. This is how the malicious page can interact with local services (or devices) on the victim’s network.

Other options don’t fit because they don’t describe a technique that changes DNS to target local IPs and bypass SOP.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy