Since the topic of SQL Injection is mentioned, I'll have to
link here I guess the article is a good introduction, but it fails to mention abusing daemon software vulnerabilities... which is one very important attack vector as well, since there's automated tools for scanning blocks of IPs for vulnerable software and "auto-root the boxes"...