HTG Explains: How Hackers Take Over Web Sites with SQL Injection / DDoS
        Posted  
        
            by Jason Faulkner
        on How to geek
        
        See other posts from How to geek
        
            or by Jason Faulkner
        
        
        
        Published on Wed, 16 Nov 2011 13:00:41 +0000
        Indexed on 
            2011/11/16
            17:59 UTC
        
        
        Read the original article
        Hit count: 299
        

Even if you’ve only loosely followed the events of the hacker groups Anonymous and LulzSec, you’ve probably heard about web sites and services being hacked, like the infamous Sony hacks. Have you ever wondered how they do it?
There are a number of tools and techniques that these groups use, and while we’re not trying to give you a manual to do this yourself, it’s useful to understand what’s going on. Two of the attacks you consistently hear about them using are “(Distributed) Denial of Service” (DDoS) and “SQL Injections” (SQLI). Here’s how they work.
Image by xkcd
| HTG Explains: How Hackers Take Over Web Sites with SQL Injection / DDoS | Use Your Android Phone to Comparison Shop: 4 Scanner Apps Reviewed | How to Run Android Apps on Your Desktop the Easy Way | 
© How to geek or respective owner



