1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
3 years ago
6

A popular game allows for in-app purchases to acquire extra lives in the game. When a player purchases the extra lives, the numb

er of lives is written to a configuration file on the gamer's phone. A hacker loves the game but hates having to buy lives all the time, so they developed an exploit that allows a player to purchase 1 life for $0.99 and then modifies the content of the configuration file to claim 100 lives were purchased before the application reading the number of lives purchased from the file. Which of the following type of vulnerabilities did the hacker exploit?
a. Sensitive data exposure.
b. Dereferencing.
​c. Broken authentication.
​d. Race condition.
Computers and Technology
1 answer:
Taya2010 [7]3 years ago
4 0

Based on the fact that the hacker's actions are done before the application reading of the lives purchased, this is <u>d. Race condition. </u>

<h3>What is a race condition?</h3>

This is when certain processes in an application depend on the timing of a a previous process or event. The flow of information can then be intercepted before the process completes.

This is what the hacker did here by accessing the application to change the number of lives purchased before the application read the number of lives purchased.

In conclusion, option D is correct.

Find out more on the race condition at brainly.com/question/13445523.

You might be interested in
Convert 578.2 into hexadecimal​
siniylev [52]
The answer is 243. Hope it helps
5 0
3 years ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
(100 points ASAP PLease) Type the correct answer in the box. Spell all words correctly.
Katena32 [7]

Answer:

Maria can ensure that the video is recording correctly by checking the _____. 1. See answer.

8 0
2 years ago
Suppose you want to delete an existing file from within word. What would you do?
Oksana_A [137]
Go in to ur files and find the file and delete it
5 0
3 years ago
5. What is a domain name used for?​
Mnenie [13.5K]

<u>Answer:</u>

Domain names serve to identify Internet resources, such as computers, networks, and services, with a text-based label that is easier to memorize than the numerical addresses used in the Internet protocols. A domain name may represent entire collections of such resources or individual instances.

<u />

<u>Explanation:</u>

*Hope this helps*

7 0
3 years ago
Other questions:
  • This assignment is to read from an input file and process the data for a group of people. Your program calculates the interest a
    5·1 answer
  • Maria is developing an online gaming website. She is working on an interactive game that has a central character guiding the vis
    14·2 answers
  • Is this statement true or false?
    12·2 answers
  • Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 then the outp
    12·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • Microsoft's
    8·1 answer
  • Someone once observed that "the difference between roles and groups is that a user can shift into and out of roles, whereas that
    13·1 answer
  • What help in executing commands quickly
    5·1 answer
  • HI How are you anyways are any of you intreseted in my giveaway
    7·2 answers
  • What number will be output by the console.log command on line 5?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!