SQL injection attack consists of insertion or "injection" of either a partial or complete SQL query via the data input or transmitted from the client (browser) to the web application. A successful SQL injection attack can:
i) Read sensitive data from the database
iii) Modify database data (insert/update/delete)
iii) Execute administration operations on the database (such as shutdown the DBMS) iV) Recover the content of a given file existing on the DBMS file system or write files into the file system v) Issue commands to the operating system

Pen tester needs to perform various tests to detect SQL injection vulnerability. He has to make a list of all input fields whose values could be used in crafting a SQL query, including the hidden fields of POST requests and then test them separately, trying to interfere with the query and to generate an error.
In which of the following tests is the source code of the application tested in a non-runtime environment to detect the SQL injection vulnerabilities?
Casie
3 months agoLong
3 months agoLigia
3 months agoOllie
4 months agoHobert
4 months agoMurray
4 months agoAngelo
4 months agoMurray
4 months agoIsaiah
5 months agoRaelene
5 months agoCristen
5 months agoSang
5 months agoAlex
5 months agoRosalind
5 months agoAhmed
5 months agoPenney
5 months agoGlory
5 months agoVilma
5 months agoCharisse
10 months agoSean
8 months agoYen
9 months agoLonny
9 months agoDominque
10 months agoHyun
8 months agoLachelle
9 months agoKattie
10 months agoOneida
10 months agoBernardo
10 months agoDelmy
10 months agoTyisha
9 months agoJennie
9 months agoSelma
11 months agoJeanice
9 months agoLisbeth
10 months agoWilbert
10 months agoJin
10 months agoTesha
11 months agoTroy
11 months agoCandida
11 months ago