Académique Documents
Professionnel Documents
Culture Documents
SQL INJECTION
ATTACKS
A
WHAT
THEY DO
HOW IT
HAPPENS
Credential theft
Probing and reconnaissance
Database content retrieval
Website defacement
Login privilege escalation
Data corruption
Remote command execution
Denial of service
Data and file exfiltration
Business logic subversion
AKAMAI TO
THE RESCUE
7 days
2,000 web applications
8 million SQL injection payloads
* Data from Akamais Kona Site Defender web
application firewall (WAF)