SQL Injection, Part 3 of 8: Attacking Websites

I've shown you the basic structure of a SQL injection attack, as well as how to take advantage of dynamic SQL to do bad things.  Now, however, I want to move to the area where SQL injection really takes on a life of its own:  websites.  For my example, I'm going to use a very…

Advertisement