Which type of threat occur when an attacker can send hostile data to an interpreter within an application?
Injection attacks occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Common types of injection attacks include SQL injection, command injection, and LDAP injection. These types of attacks exploit vulnerabilities in how an application processes input data, allowing attackers to inject malicious commands or queries into the system.
Cisco DevNet Associate Certification Guide: Chapter on Security, specifically on common web application vulnerabilities.
OWASP (Open Web Application Security Project) Top Ten Web Application Security Risks: Injection.
Tanja
3 months agoLashanda
3 months agoFatima
3 months agoSharen
4 months agoGail
4 months agoPaola
4 months agoOlive
4 months agoRodrigo
5 months agoVivan
5 months agoMitsue
5 months agoFlo
5 months agoMarcos
5 months agoMira
5 months agoCherri
6 months agoPete
10 months agoSilva
9 months agoGracia
9 months agoRichelle
10 months agoMari
10 months agoLawrence
10 months agoStephaine
9 months agoCaitlin
9 months agoRaina
9 months agoMerrilee
11 months agoRory
11 months agoPamella
11 months agoAmie
11 months agoTimothy
12 months agoElouise
10 months agoCristal
10 months agoVincent
10 months agoReita
10 months agoTrinidad
10 months agoBrandon
10 months agoEllsworth
11 months agoIluminada
11 months agoOliva
12 months agoCasandra
12 months ago