Which of the following types of application attacks would be used to specifically gain unauthorized information
from databases that did not have any input validation implemented?
Session hijacking and XML injection
Cookies and attachments
Buffer overflow and XSS
To access information in databases, you use SQL. To gain unauthorized information from databases, a SQL
Injection attack is used.
SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL
statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).
SQL injection must exploit a security vulnerability in an application’s software, for example, when user input is
either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not
strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but
can be used to attack any type of SQL database.