Поиск Google ничего не нашел

Sql injection bypassing hand book blackrose

www.slideshare.net

In some cases, it may be possible to read in or write out to files, or to execute shell commands on the underlying operating system.

Поиск реализован с помощью YandexXML и Google Custom Search API