what stage of Virus life does a stealth virus gets activated with the user performing certain actions such as running an infected program?
This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.