The document portrays the characters from Cinderella in multiple ways. Initially, the step-mother and step-sisters are shown as evil, spiteful, cruel, ugly, and angry bullies. However, the document then suggests these characters could also be seen as stressed, responsible parents and children who are lonely and want to feel powerful like their peers. Finally, the document states that all the characters have a need for power, with the step-mother deriving it from anger, the step-sisters from being real daughters, and Cinderella from magic and becoming a princess.
Dominating headlines for the past year, SQLi has become a widely-known, even outside the circle of security professionals. And for good reason: SQL injection is probably the most expensive and costly attack since it is mainly used to steal data. Famous breaches, including Sony, Nokia, Heartland Payment Systems and even Lady Gaga's Web sites were compromised by hackers who used SQL injection to break-in to the application's backend database. LulzSec, the notorious hacktivist group, made SQLi a key part of their arsenal. This report details how prevalent SQL injection attacks have become, how attacks are executed and how hackers are innovating SQLi attacks to bypass security controls as well as increase potency.
SQL injection exploitation internals: How do I exploit this web application injection point?
These slides have been presented at a private conference in London on January 9, 2009.
Dominating headlines for the past year, SQLi has become a widely-known, even outside the circle of security professionals. And for good reason: SQL injection is probably the most expensive and costly attack since it is mainly used to steal data. Famous breaches, including Sony, Nokia, Heartland Payment Systems and even Lady Gaga's Web sites were compromised by hackers who used SQL injection to break-in to the application's backend database. LulzSec, the notorious hacktivist group, made SQLi a key part of their arsenal. This report details how prevalent SQL injection attacks have become, how attacks are executed and how hackers are innovating SQLi attacks to bypass security controls as well as increase potency.
SQL injection exploitation internals: How do I exploit this web application injection point?
These slides have been presented at a private conference in London on January 9, 2009.
8. Step-mother
Stressed
Responsible
parent
Wants the best for
her children
Frustrated
Worried
Single Mother What will happen
to my children
when I get old?
9. Step-sisters
Lonely
Hard to
compete with
perfect sister
Wanted to have
princess weddings
Wanted to be
rich like
everyone else
10. Cinderella
Used magic to
solve her
problems Devious
Deceitful
Bully
Pretends to be
Gets help from helpless
everyone Spoilt
teenager
11. What is the one thing they all
have in common?
NEED
FOR
POWER
12. Step mother → Power from being angry
Step sisters → Power from being real daughters
Cinderella → Power from magic & Prince
14. ● If you have something everyone wants
● When you are the boss
● When you are older than your brothers and
sisters
● Knowledge
● Having lots of muscles
●Lots of money
● Being famous
15. ● Being president of a big country
●Bullying
● When people depend on you
● Your family (ancestors)
Rage
●
● Your job – police, writer, doctor, fireman,
prison warden