1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
2 years ago
6

A popular game allows for in-app purchases to acquire extra lives in the game. When a player purchases the extra lives, the numb

er of lives is written to a configuration file on the gamer's phone. A hacker loves the game but hates having to buy lives all the time, so they developed an exploit that allows a player to purchase 1 life for $0.99 and then modifies the content of the configuration file to claim 100 lives were purchased before the application reading the number of lives purchased from the file. Which of the following type of vulnerabilities did the hacker exploit?
a. Sensitive data exposure.
b. Dereferencing.
​c. Broken authentication.
​d. Race condition.
Computers and Technology
1 answer:
Taya2010 [7]2 years ago
4 0

Based on the fact that the hacker's actions are done before the application reading of the lives purchased, this is <u>d. Race condition. </u>

<h3>What is a race condition?</h3>

This is when certain processes in an application depend on the timing of a a previous process or event. The flow of information can then be intercepted before the process completes.

This is what the hacker did here by accessing the application to change the number of lives purchased before the application read the number of lives purchased.

In conclusion, option D is correct.

Find out more on the race condition at brainly.com/question/13445523.

You might be interested in
When disabling inherited permissions on an object, what happens if you select Remove all inherited permissions from this object?
Rasek [7]

Answer:

Answer explained below

Explanation:

When disabling inherited permissions on an object, if you select Remove all inherited permissions from this object then you lose every user or group assigned to the folder.

This will delete all existing permissions, including administrator accounts, leaving you a blank slate to apply your own permissions to the folder.

5 0
3 years ago
How to write cube of a number from flowchart ​
AlekseyPX

Answer:

This is the process to write flowchart .

Help it is helpful.

4 0
3 years ago
What technique is most commonly associated with the use of malicious flash drives by penetration testers
nasty-shy [4]

Answer: Distributing malicious flash drives in a parking lot or other high-traffic area, often with a label that will tempt the person who finds it into plugging it in, is a technique used by penetration testers.

Explanation:

4 0
2 years ago
Which area located at the top of the word screen includes home , insert , and page layout ?
Misha Larkins [42]

Answer:

Whats your qeustion

Explanation:

4 0
3 years ago
Read 2 more answers
What two methods can be used to access and modify an existing program that is running on an iot device in cisco packet tracer? (
dsp73

Cisco Packet Tracer is tool used for network simulation and visualization program.

The two methods can be used to access and modify an existing program that is running on an IoT device in Cisco packet trace are the following:

1. Click on the device then select the Programming tab.

2. Go to the registration server and login. Then select the Editor tab.

3 0
3 years ago
Other questions:
  • You can double-click a window’s title bar to maximize the window. true false
    9·1 answer
  • A digital footprint is all of the information on-line about a person posted by that person or others, ____________. intentionall
    14·1 answer
  • A work-study student receives a paycheck from:
    15·2 answers
  • A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. managem
    10·1 answer
  • The marketplace is the essence of which of the following?
    11·1 answer
  • Retype and run, note incorrect behavior. Then fix errors in the code, which should print num_stars asterisks.
    9·1 answer
  • Hypercompetition implies that any architecture must be designed with maximum flexibility and _____ to ensure it can handle the i
    6·1 answer
  • Add me on f0rtnite <br> (Tsarbacon)
    9·2 answers
  • What happens when the electrons flowing through the light bulb change direction?
    11·1 answer
  • If I bought mine craft p.e. for 7.99 and hook my Micro soft account up, will i get java edition
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!