A penetration tester is looking for vulnerabilities within a company's web application that are in scope. The penetration tester discovers a login page and enters the following string in a field:
1;SELECT Username, Password FROM Users;
Which of the following injection attacks is the penetration tester using?
RRabbit_111
Highly Voted 2 years, 5 months agoRRabbit_111
2 years, 5 months agooutnumber_gargle024
1 year, 1 month agoEtc_Shadow28000
Most Recent 1 year agosolutionz
1 year, 11 months agonickwen007
2 years, 4 months agocy_analyst
2 years, 4 months ago[Removed]
2 years, 4 months agokloug
2 years, 4 months ago[Removed]
2 years, 5 months agoHskwkhfb
2 years, 7 months agomasso435
2 years, 7 months ago