All Documents
Current Document

Content is empty

If you don't find the content you expect, please try another search term



Last updated:2020-05-22 11:32:19

Attack types Description
SQL injection Deceives the server into executing malicious SQL commands by inserting them into the submitted Web form or the query string for a domain name or page request.
Cross-site Scripting (XSS) Inserts malicious script codes into the web page, which will be executed during page browsing.
File-inclusion Injects a malicious script or coding into the website, which is then executed on the server.
Remote command execution The program fails to examine the input data strictly. Then, the attacker can control the command execution and intrude the system.
Sensitive data exposure Obtains personal or enterprise’s sensitive data by exploiting system vulnerabilities.
Malicious scanning Uses automatic scanners to exploit Web vulnerabilities.
Challenge collapsar (CC) Uses a proxy server to generate and send standard HTTP requests to the targeted Web server frequently to exhaust the resources of the Web server.
On this page
Pure ModeNormal Mode

Pure Mode

Click to preview the document content in full screen