Register
100:00
Stop
CEH - Hacking Web Applications
Beginner
1/100
You're conducting a security assessment for a travel company that has released a mobile app allowing users to book flights and access boarding passes. The app utilizes QR codes for boarding pass verification. You notice that when users generate QR codes, the app creates them with embedded SQL commands that are passed directly to the backend database for validation. What mobile attack vector is most likely being implemented here?
a.
SQL Injection through QR code payloads
b.
Cross-Site Request Forgery through mobile app redirection
c.
QR code spoofing with malformed authentication tokens that execute when scanned by personnel at boarding gates
d.
Session hijacking through insecure QR code generation and transmission protocols over mobile networks
Beginner