28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 6<br />

Exploiting the<br />

Operating System<br />

Solutions in this chapter:<br />

■■<br />

■■<br />

■■<br />

Accessing the File System<br />

Executing Operating System Comm<strong>and</strong>s<br />

Consolidating Access<br />

˛ Summary<br />

˛ Solutions Fast Track<br />

˛ Frequently Asked Questions<br />

271

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!