User Tools

Site Tools


programming:sqli_sql_injection

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
programming:sqli_sql_injection [2020/07/15 09:30] – external edit 127.0.0.1programming:sqli_sql_injection [2022/10/11 12:59] (current) peter
Line 1: Line 1:
 ====== SQLi (SQL Injection) ====== ====== SQLi (SQL Injection) ======
  
-**All** SQL Injection is due to dynamic SQL queries.  Strongly consider prohibiting dynamic SQL queries completely. +SEE:  [[Hacking:SQL Injection (SQLi)|SQL Injection (SQLi)]]
- +
-Injection flaws occur when an application sends untrusted data to an interpreter.  Injection flaws are very prevalent, particularly in legacy code.  They are often found in SQL, LDAP, Xpath, or NoSQL queries; OS commands; XML parsers, SMTP Headers, program arguments, etc.  Injection flaws are easy to discover when examining code, but frequently hard to discover via testing.  Scanners and fuzzers can help attackers find injection flaws. +
- +
-[[SQL Injection:Basic types of SQL injections|Basic types of SQL injections]] +
- +
-[[SQL Injection:Check if a website is vulnerable to SQL Injection|Check if a website is vulnerable to SQL Injection]] +
- +
-[[SQL Injection:Example attacks|Example attacks]] +
- +
-[[SQL Injection:False measures and bad practices|False measures and bad practices]] +
- +
-[[SQL Injection:Primary Defenses|Primary Defenses]] +
- +
-[[SQL Injection:What is SQL Injection|What is SQL Injection]] +
- +
-[[SQL Injection:Why not to use escape quotes as a defence|Why not to use escape quotes as a defence]] +
  
  
programming/sqli_sql_injection.1594805433.txt.gz · Last modified: 2020/07/15 09:30 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki