Last updated:2020-05-22 11:32:19

Attack types Description
SQL injection Deceives the server into executing malicious SQL commands by inserting them into the submitted Web form or the query string for a domain name or page request.
Cross-site Scripting (XSS) Inserts malicious script codes into the web page, which will be executed during page browsing.
File-inclusion Injects a malicious script or coding into the website, which is then executed on the server.
Remote command execution The program fails to examine the input data strictly. Then, the attacker can control the command execution and intrude the system.
Sensitive data exposure Obtains personal or enterprise’s sensitive data by exploiting system vulnerabilities.
Malicious scanning Uses automatic scanners to exploit Web vulnerabilities.
Challenge collapsar (CC) Uses a proxy server to generate and send standard HTTP requests to the targeted Web server frequently to exhaust the resources of the Web server.

Did you find the above information helpful?

Mostly Unhelpful
A little helpful
Very helpful

What might be the problems?

Unclear or awkward
Redundant or clumsy
Lack of context for the complex system or functionality

More suggestions


Please give us your feedback.


Thank you for your feedback.