John Conroy zpracoval užite?ný p?ehled, který je rozd?len do následujících odstavc?:
- SQL Injection (
Backdoor Injection- Modules, Forums, Search etc.,
Automated Injection,
Remote Injection,
SQL Injection in the Browser Address Bar)
- Cross Site Scripting (XSS)
- Authorization Bypass
- Google Hacking
- Password Cracking
- A Few Defensive Measures