Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 13 years ago.
您可能想查看SQL 注入速查表。它列出了黑客通常尝试确定特定输入字段是否可利用,然后从数据库中提取数据的技巧。
You probably want to take a look at the SQL Injection Cheatsheet. It lists the tricks hackers will usually try to determine whether a particular input field is exploitable and then to extract data from the database.
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
暂无简介
文章 0 评论 0
接受
发布评论
评论(1)
您可能想查看SQL 注入速查表。它列出了黑客通常尝试确定特定输入字段是否可利用,然后从数据库中提取数据的技巧。
You probably want to take a look at the SQL Injection Cheatsheet. It lists the tricks hackers will usually try to determine whether a particular input field is exploitable and then to extract data from the database.