- SCT Web Site
... often needs to know database schema information,
such as table names, column names, and column data
This information can be used in a follow-on attack.
These types of attacks employ techniques that will
extract data values from the database.
Depending on the type of web application, this