ethical-hacker video for ________________ is a type of SQL injection that exploits a database server's capability to initiate DNS requests as a means of
________________ is a type of SQL injection that exploits a database server's capability to initiate DNS requests as a means of transmitting data to an attacker.