19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

356 Chapter 9 n Attacking Data Stores<br />

10. You are probing an <strong>application</strong> function that enables you to search personnel<br />

details. You suspect that <strong>the</strong> function is accessing ei<strong>the</strong>r a database or<br />

an Active Directory back end. How could you try to determine which of<br />

<strong>the</strong>se is <strong>the</strong> case?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!