1 00:00:00,240 --> 00:00:08,700 Now let's discuss about a sequel injection Attack, a school is also pronounced as sequel obscure stands 2 00:00:08,700 --> 00:00:15,780 for structured query language, as we discussed earlier at school, is a programming language that used 3 00:00:15,780 --> 00:00:23,250 to communicate with DBRS, many of the servers that stole critical data for websites and services used 4 00:00:23,280 --> 00:00:26,160 at school to manage the data in their database. 5 00:00:26,520 --> 00:00:33,810 A injection attack specifically targeted this kind of server using malicious code to get the server 6 00:00:33,810 --> 00:00:35,190 to develop information. 7 00:00:35,580 --> 00:00:41,910 This is especially problematic if the server store's private customer information from the websites, 8 00:00:41,910 --> 00:00:48,690 such as credit card numbers, username and password like other credentials or other personally identifiable, 9 00:00:48,690 --> 00:00:54,230 identifiable information which are tempting and lucrative targets for an attacker. 10 00:00:54,570 --> 00:01:00,990 And a sequel injection attack works by exploiting any one of the known as credible liabilities that 11 00:01:00,990 --> 00:01:03,990 allows the escarole server to run malicious codes. 12 00:01:04,320 --> 00:01:11,760 For example, if a secure server is or labeller to an injection attack, it may be possible for an attacker 13 00:01:11,880 --> 00:01:18,990 to go to a Web site search box and type in code that would force these sites escort server to dump all 14 00:01:18,990 --> 00:01:22,140 of its story, username and password for this site.