怒伯
发表于 2013-5-29 11:54:08
* SQL Injection: Is a technique used to obtain, read and modify information/data from applications. This can be done by inserting or injecting a SQL query via the input data from an application.
* Remote Command Execution: This allows an attacker to execute operating system commands due to inadequate input validation. When attackers gain access to the system, they can execute commands from remote locations.
* Weak Authentication and Authorization: Authentication mechanisms that don’t prohibit multiple failed logins can be attacked. When an attacker gains access to login information, he/she can have full access to documents, emails, pictures, ability toputer settings, etc.
◆小葱花-70◆
发表于 2013-5-29 12:56:37
桃子° 发表于 2013-5-29 08:23 static/image/common/back.gif
谢谢你的回复
呵呵!#24#
CallMeWhatever
发表于 2013-5-29 12:57:13
怒伯 发表于 2013-5-29 11:54 static/image/common/back.gif
* SQL Injection: Is a technique used to obtain, read and modify information/data from applications....
谢谢你的回复
小影
发表于 2013-5-29 12:57:34
.。。。。。。。。。
CallMeWhatever
发表于 2013-5-29 13:07:28
小影 发表于 2013-5-29 12:57 static/image/common/back.gif
.。。。。。。。。。
谢谢你的回复
474664978
发表于 2013-5-29 13:09:40
·······
CallMeWhatever
发表于 2013-5-29 13:10:04
474664978 发表于 2013-5-29 13:09 static/image/common/back.gif
·······
谢谢你的回复
nhxmars
发表于 2013-5-29 13:10:07
-,--,-
CallMeWhatever
发表于 2013-5-29 13:11:11
nhxmars 发表于 2013-5-29 13:10 static/image/common/back.gif
谢谢你的回复
大舅
发表于 2013-5-29 13:39:55
。。