- UID
- 2545
- 铜币
- 6472 个
- 威望
- 0 点
- 贡献值
- 0 点
- 金币
- 0 个
- 积分
- 530
|
发表于 2013-5-29 11:54:08
|
显示全部楼层
* SQL Injection: Is a technique used to obtain, read and modify information/data from applications. This can be done by inserting or injecting a SQL query via the input data from an application.
* Remote Command Execution: This allows an attacker to execute operating system commands due to inadequate input validation. When attackers gain access to the system, they can execute commands from remote locations.
* Weak Authentication and Authorization: Authentication mechanisms that don’t prohibit multiple failed logins can be attacked. When an attacker gains access to login information, he/she can have full access to documents, emails, pictures, ability to puter settings, etc. |
|