Wednesday 10 December 2014


Injection attacks are based on a single problem that persists in many technologies: namely, no strict separation exists between program instructions and user data (also referred to as user input). This problem allows for attackers to sneak program instructions into places where the developer expected only benign data. By sneaking in program instructions, the attacker can instruct the program to perform actions of the attacker’s choosing


Download

0 comments:

Post a Comment