Content is empty
If you don't find the content you expect, please try another search term
Last updated:2020-05-22 11:32:19
Attack types | Description |
---|---|
SQL injection | Deceives the server into executing malicious SQL commands by inserting them into the submitted Web form or the query string for a domain name or page request. |
Cross-site Scripting (XSS) | Inserts malicious script codes into the web page, which will be executed during page browsing. |
File-inclusion | Injects a malicious script or coding into the website, which is then executed on the server. |
Remote command execution | The program fails to examine the input data strictly. Then, the attacker can control the command execution and intrude the system. |
Sensitive data exposure | Obtains personal or enterprise’s sensitive data by exploiting system vulnerabilities. |
Malicious scanning | Uses automatic scanners to exploit Web vulnerabilities. |
Challenge collapsar (CC) | Uses a proxy server to generate and send standard HTTP requests to the targeted Web server frequently to exhaust the resources of the Web server. |
Pure Mode