SQL Injection – 2 (Fingerprinting)
This is a follow up to the post SQL Injection – An Introduction. If you are new to this, I stongly suggest you read the introduction first. In this article we shall discuss how to fingerprint the common databases managenet system backend. This forms the first part of a successful SQL Injection attack as different… |