(wiki) SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.

More Info

http://www.planetcreator.net/downloads/2010/06/19/sql-injection-cheat-sheet/

Explore More

Password breaking service (Stolen password recovery)

Last month we had about 400 emails asking details on how to break into the email account. The reason many of them put forward are ‘they forgot and got important

What are snort rules?

Snort rules are the conditions specified by a Network Administrator that differentiate between normal Internet activities and malicious activities. Snort rules are made up of two basic parts: * Rule

Critical XSS Vulnerability in Ministry of Transport http://www.mot.gov.mm/

PlanetCreator has reported another Critical XSS Vulnerability in Ministry of Transport http://www.mot.gov.mm/ Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious