{"id":6823,"date":"2020-10-31T01:02:26","date_gmt":"2020-10-31T05:02:26","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/?p=6823"},"modified":"2020-10-31T01:02:26","modified_gmt":"2020-10-31T05:02:26","slug":"week-10-readings","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/2020\/10\/31\/week-10-readings\/","title":{"rendered":"Week 10 Readings"},"content":{"rendered":"<p>Readings this week had a concentration in Burp Suite and injection attacks.\u00a0 Injection attacks have dominated the top of web application vulnerability lists for much of the past decade.\u00a0 XSS remains the most prevalent vulnerability, while SQL injection is the most often exploited of these vulnerabilities.\u00a0 Injection attacks are preferred by malicious users as a way to obtain restricted data from a back end database or to embed malicious code onto a web server that will in turn serve up malware to unsuspecting clients.<\/p>\n<p>&nbsp;<\/p>\n<p>Questions for the class:<\/p>\n<p>What is an example of a SQLi?\u00a0 Meaning what input would the attacker put in the URL to try a SQLi?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Readings this week had a concentration in Burp Suite and injection attacks.\u00a0 Injection attacks have dominated the top of web application vulnerability lists for much of the past decade.\u00a0 XSS remains the most prevalent vulnerability, while SQL injection is the most often exploited of these vulnerabilities.\u00a0 Injection attacks are preferred by malicious users as a [&hellip;]<\/p>\n","protected":false},"author":25060,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[809353],"tags":[],"class_list":{"0":"post-6823","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-10-web-application-hacking","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/users\/25060"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/comments?post=6823"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6823\/revisions"}],"predecessor-version":[{"id":6824,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6823\/revisions\/6824"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/media?parent=6823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/categories?post=6823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/tags?post=6823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}