Mobile Devices Not Long Ago a Law

Explore workouts, and achieving AB Data
Post Reply
sadiksojib131
Posts: 18
Joined: Sun Dec 22, 2024 4:01 am

Mobile Devices Not Long Ago a Law

Post by sadiksojib131 »

In SQL it sounds something like this: GET 100 RUBLES FROM YOUR WALLET AND GIVE THEM TO KOLYA Nikita, Kolya's brother, finds the note. Taking advantage of the fact that Dad's handwriting is illegible, he decides to add to it. GET 100 RUBLES FROM YOUR WALLET AND GIVE THEM TO KOLYA OR NIKITA Mom comes home, reads the note and decides that since she gave money to Kolya yesterday, she will give it to Nikita today.


As a result, because the data is not filtered (illegible handwriting) - Nikita russian phone number list got rich. From this example we understand that the database gives what is required of it, without much analysis or reflection on its actions. Since there is access to it, it means that the user is already its owner, and therefore it is necessary to give the data that is in the database cells.

Image

We will use this, because the plugin/component that is on the site already inspires trust in the database by default. How to protect your website from viruses How to protect your website from viruses And you don't need a crowbar if you have an address bar. There are many hacker sites and forums where vulnerabilities for SQL injection are posted, there are also sites that specialize in compiling a certain vulnerability database.


We go to the site, open the vulnerability, read for which version of the CMS this vulnerability is relevant and search for the site. Now we will see how this happens in practice. We will try not to go into the technical component, we will only show the principle, because our goal is to show how easy it is sometimes to hack a site due to the carelessness of the site administrator.
Post Reply