Back to Browse

[web-security] Step by Step SQL Injection PART 6/7

110 views
Mar 15, 2023
3:01

A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system.

Download

0 formats

No download links available.

[web-security] Step by Step SQL Injection PART 6/7 | NatokHD