- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 47字
- 2021-06-10 18:35:34
Out-of-band SQLi
Out-of-band SQLi attacks rely on the DBMS's capability to perform DNS or HTTP requests to deliver the data to the attacker. It is usually used with MS SQL server commands, which are normally used to make DNS requests, and Oracle DB, which sends HTTP requests.
推薦閱讀
- 黑客大曝光:無線網絡安全(原書第3版)
- INSTANT Burp Suite Starter
- 計算機病毒分析與防范大全(第3版)
- 計算機病毒原理與防范(第2版)
- Learning Veeam? Backup & Replication for VMware vSphere
- API攻防:Web API安全指南
- Falco云原生安全:Falco原理、實踐與擴展
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 編譯與反編譯技術實戰
- Mastering Linux Security and Hardening
- 復雜信息系統網絡安全體系建設指南
- Mastering Metasploit
- 安全網絡構建
- 密碼朋克:自由與互聯網的未來
- 防火墻和VPN技術與實踐