- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 47字
- 2021-06-10 18:35:34
Out-of-band SQLi
Out-of-band SQLi attacks rely on the DBMS's capability to perform DNS or HTTP requests to deliver the data to the attacker. It is usually used with MS SQL server commands, which are normally used to make DNS requests, and Oracle DB, which sends HTTP requests.
推薦閱讀
- 黑客大曝光:無線網絡安全(原書第3版)
- 網絡空間攻防技術原理
- 工業互聯網安全防護與展望
- Learning Veeam? Backup & Replication for VMware vSphere
- 零信任網絡:在不可信網絡中構建安全系統(第2版)
- Instant Java Password and Authentication Security
- 網絡空間安全:拒絕服務攻擊檢測與防御
- Mastering Malware Analysis
- 計算機網絡安全實驗指導
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- Blockchain Development with Hyperledger
- 網絡安全設計
- Web前端黑客技術揭秘
- 網絡對抗的前世今生
- 一本書講透混合云安全