CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:
What is SQL injection?
Understand the steps to conduct SQL injection
Understand SQL Server vulnerabilities
Describe SQL injection countermeasures
Overview of stack-based buffer overflows
Identify the different types of buffer overflows and methods of detection
Overview of buffer overflow mutation techniques
SQL injection is a hacking method used to attack SQL databases, whereas buffer overflows can exist in many different types of applications. SQL injection and buffer overflows are similar exploits in that they're both usually delivered via ...