Phishing is a way of
attempting to acquire information (and sometimes, indirectly, money) such as
usernames, passwords, and credit card details by masquerading as a trustworthy
entity in an electronic communication.
This post is intended for learning
purpose in a topic of PenTest and how to avoid bad user input to protect your
site, system from begin misused.
SQL
Injection:
SQL
Injection is most popular SQL vulnerability that used to attack SQL database,
this attack may affect the hosting operating system. When user gains access to
your database, he tries to escalate his privilege to gain administration
permission.