SQL injection typically leverages non-validated input vulnerabilities to
pass SQL commands through a Web application for execution by a backend
database. Crafty attackers take advantage of SQL commands with
user-provided parameters to execute arbitrary SQL queries and/or
commands on the backend database server through the Web application.
This video demonstration, however, shows the database being attacked
directly by a non-privileged user, not through a Web application, but
via direct interaction with the database.
Uploaded by
ImpervaChannel
on Aug 13, 2009
Friday, December 9, 2011
Home »
Database
,
Information Security
,
Software Security
» Exposing Direct Database SQL Injection Attacks
0 comments:
Post a Comment