Cisco 200-201 Question Answer
Refer to the exhibit.
Which attack is being attempted against a web application?
SQL injection
man-in-the-middle
command injection
denial of service
The exhibit shows an HTTP GET request with a parameter that includes; /bin/sh -c id.
This indicates a command injection attempt, where the attacker is trying to execute shell commands on the server.
Command injection vulnerabilities allow an attacker to execute arbitrary commands on the host operating system via a vulnerable application.
The use of/bin/shand the-cflag is typical in command injection exploits to run shell commands, such asid, which returns user identity information.
References
OWASP Command Injection
Analyzing HTTP Requests for Injection Attacks
Web Application Security Testing Guidelines
TESTED 17 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved