tag:blogger.com,1999:blog-7122745763234660283.post876119765982040850..comments2024-02-18T02:36:33.709-08:00Comments on IMQ Minded Security Blog: OWASP-Italy interviewed by Repubblica.itMinded Securityhttp://www.blogger.com/profile/01503616812076743415noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-7122745763234660283.post-24532130871806806422009-12-18T16:58:28.525-08:002009-12-18T16:58:28.525-08:00It's very important to outline that SQL Inject...It's very important to outline that SQL Injection attacks can be used directly to steal credit card data if the affected site is an e-commerce site.<br /><br />Many online shops have the payment gateway configurations stored inside the database. An attacker could modify these information via SQL injection of course and then route the billing requests to his evil payment proxy. Hey, this is not a Phishing Attack, just a trick to transparently sniff the user data.Giorgio Fedonhttps://www.blogger.com/profile/10261243238330266276noreply@blogger.com