ECCouncil 312-39 Question Answer
An attacker, in an attempt to exploit the vulnerability in the dynamically generated welcome page, inserted code at the end of the company’s URL as follows:
http://technosoft.com.com/ . Identify the attack demonstrated in the above scenario.
