Most of the time, if a web application gets compromised, we hear about vulnerabilities like cross site scripting or SQL injection being used to gain access. However, many high profile web application defacements dont need tools like sqlmap or BeEF. Ins...
↧