XSS, Command and SQL Injection vectors: Beyond the Form
Page 1 of 1
XSS, Command and SQL Injection vectors: Beyond the Form
This article is less of a "how to" and more of an inspiration piece. I wanted to kick start your brain into thinking about alternate ways of exploiting a system, especially when it comes to the sanitation of input. We are all used to the idea of injecting an XSS, SQL or a command string into a web form, but what about other vectors for injection?
See irongeek
See irongeek
andry- Moderator
- Posts : 467
Join date : 2010-05-07
Similar topics
» Opening Command Prompt directly for a Particular Directory from Explorer
» PDF Silent HTTP Form Repurposing Attacks
» Best Alternative If Command Prompt Is Blocked
» Introducing the Google Command Line Tool
» Run command prompt utilities successfully from shortcuts
» PDF Silent HTTP Form Repurposing Attacks
» Best Alternative If Command Prompt Is Blocked
» Introducing the Google Command Line Tool
» Run command prompt utilities successfully from shortcuts
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
|
|