revision2

12345678910111213141516171819
Across
  1. 2. A common place where attackers test for authentication bypass
  2. 4. Function often used in time-based SQL injection
  3. 6. Unsanitized user _______ is often the entry point for SQL injection
  4. 7. Used to ignore the rest of a legitimate SQL query (--)
  5. 10. SQL injection where the attacker cannot see errors but infers information through behavior
  6. 12. 1=1 is always ______
  7. 14. A request sent from a website to a database
  8. 15. information blue teamers may use to understand an attack
  9. 17. A type of injection that uses response delays
  10. 18. SQL keyword used to retrieve data from a database
  11. 19. A security device that can be used to stop SQL injection attacks
Down
  1. 1. The type of database that will respond to @@version
  2. 3. the act of putting malicious SQL queries into a web application
  3. 5. Websites often talk to this backend system to retrieve or store data
  4. 8. Type of SQL injection that relies on database messages revealing data
  5. 9. A structured set of rows and columns used to store data
  6. 11. a key word that can be used to figure out how many columns are returned
  7. 13. Type of SQL injection that combines results from multiple SELECT queries
  8. 14. a single _____ is often used to break SQL syntax
  9. 16. a tool to automate SQL attacks