Which type of threat occur when an attacker can send hostile data to an interpreter within an application?
Injection attacks occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Common types of injection attacks include SQL injection, command injection, and LDAP injection. These types of attacks exploit vulnerabilities in how an application processes input data, allowing attackers to inject malicious commands or queries into the system.
Cisco DevNet Associate Certification Guide: Chapter on Security, specifically on common web application vulnerabilities.
OWASP (Open Web Application Security Project) Top Ten Web Application Security Risks: Injection.
Pete
1 months agoRichelle
14 days agoMari
15 days agoLawrence
1 months agoMerrilee
2 months agoRory
2 months agoPamella
1 months agoAmie
2 months agoTimothy
2 months agoElouise
14 days agoCristal
16 days agoVincent
20 days agoReita
30 days agoTrinidad
1 months agoBrandon
1 months agoEllsworth
2 months agoIluminada
2 months agoOliva
2 months agoCasandra
3 months ago