The interface that communicates with your opponent’s database does not prevent user input from manipulating how the SQL code is executed. An attacker is using this exploit to manipulate confidential information.
Select an opponent. That opponent loses 1 point each round this card is in play, and must discard the top card from their deck at the end of each round this card is in play. Discard this card after 3 rounds.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.