A. By using SQL injection
B. By changing hidden form values
C. By using cross site scripting
D. By utilising a buffer overflow attack
Scroll down for answer
The following books are highly recommended to progress your CEH v10 studies.
CEH v10 EC Council questions and answers.
FREE PDF Download of all CEH v10 exam questions and answers.