Firefox Door In addition, it can also attach to running processes, monitor, and debug those processes. If source code for the running process is. The SANS/ FBI Top Twenty list is valuable because the majority of successful attacks on computer systems via the Internet can be traced to exploitation of security flaws on this list. For instance, system compromises in the Solar Sunrise Pentagon hacking incident and the easy and rapid spread of the Code Red and NIMDA worms can be traced to exploitation of unpatched vulnerabilities on this list. Sqlninja' s goal is to exploit SQL injection vulnerabilities on web applications that use Microsoft SQL Server as back end.