Watch this video tutorial to find out in simple terms what the SQL Injection vulnerability is, and how real threats result from this typical exploitation.
It features a sample exploitation scenario illustrating clear steps of what an attacker may do with a website which is vulnerable to error based SQL Injection.
Parts 2 and 3 will feature Reverse Shells and Blind SQL injection coming soon...
Post a Comment