Steps
Use wireless access points. Amateur hacking
technique called "wardriving," which uses wireless access points to
find vulnerable networks from which to launch attacks.
Use SQL injection. Once connected to those private
networks, Hackers uses a well-known technique called "SQL injection" to
trick Web applications into forking over private information that gave
him deeper access into networks. Even though it sounds complicated,
techies liken this kind of hack to simply turning the front doorknob to
get into a house.
- In the seven-layer Open System Interconnection model, a popular
reference guide for securing a network software stack, the application
layer is at the top. SQL injection is a Web-based attack that happens
on this surface level. Securing the application layer is entry-level
security stuff.
- Hackers use either a Web application scanner or Web application firewall to guard against SQL injections. A Web application scanner likely would have likely caught the SQL injection vulnerabilities . If it didn't, an application firewall probably would have isolated the attacker from gaining access to other parts of the compromised networks.
Warnings
- Only do this in your databases.
No comments:
Post a Comment