h, LLC
Tel: (301) 942-5378
Fax: (301) 933-3651
WWW: http://www.evoch.com/
> -Original Message-
> From: Charles Sheehan-Miles [mailto:char...@sheehanmiles.net]
> Sent: Wednesday, October 21, 2009 4:31 PM
> To: cf-talk
> Subject: Re: After the fact: SQL Injection Scanner
&
l Message-
> > From: Andy Matthews [mailto:li...@commadelimited.com]
> > Sent: Wednesday, October 21, 2009 3:49 PM
> > To: cf-talk
> > Subject: RE: After the fact: SQL Injection Scanner
> >
> >
> > Mark's right. If you have the SQL injection code, y
> From: Andy Matthews [mailto:li...@commadelimited.com]
> Sent: Wednesday, October 21, 2009 3:49 PM
> To: cf-talk
> Subject: RE: After the fact: SQL Injection Scanner
>
>
> Mark's right. If you have the SQL injection code, you can essentially
> reverse engineer it and
gt; -Original Message-
> From: Mark Kruger [mailto:mkru...@cfwebtools.com]
> Sent: Wednesday, October 21, 2009 3:30 PM
> To: cf-talk
> Subject: RE: After the fact: SQL Injection Scanner
>
>
> If the injection was the one that went around a few months ago - check
> out
bject: After the fact: SQL Injection Scanner
All:
A client called today letting me know that their server had been breached
and that some malicious code had been uploaded to the site. After doing
some research into the particular files that were uploaded, it turns out
that the attack is also us
com]
Sent: Wednesday, October 21, 2009 2:10 PM
To: cf-talk
Subject: After the fact: SQL Injection Scanner
All:
A client called today letting me know that their server had been breached
and that some malicious code had been uploaded to the site. After doing
some research into the particular files
All:
A client called today letting me know that their server had been breached
and that some malicious code had been uploaded to the site. After doing
some research into the particular files that were uploaded, it turns out
that the attack is also usually accompanied by a SQL Injection attack
7 matches
Mail list logo