both done through SQL Injection which is quite simple.
These web masters of the hacked site fail to upgrade their software to
close a long standing bug.
The hacks are done via a 2 step process:
1. SQL Injection Scanners such as SQLIer – SQLIer takes a vulnerable URL and attempts to determine all the necessary information to exploit the SQL Injection vulnerability by itself, requiring no user interaction at all.
2. Once the SQL vulnerability is found it is a matter of injecting malicious code into the system.
These web masters of the hacked site fail to upgrade their software to
close a long standing bug.
The hacks are done via a 2 step process:
1. SQL Injection Scanners such as SQLIer – SQLIer takes a vulnerable URL and attempts to determine all the necessary information to exploit the SQL Injection vulnerability by itself, requiring no user interaction at all.
2. Once the SQL vulnerability is found it is a matter of injecting malicious code into the system.