舉報

會員
SQL Injection Strategies
SQLinjection(SQLi)isprobablythemostinfamousattackthatcanbeunleashedagainstapplicationsontheinternet.SQLInjectionStrategiesisanend-to-endguideforbeginnerslookingtolearnhowtoperformSQLinjectionandtestthesecurityofwebapplications,websites,ordatabases,usingbothmanualandautomatedtechniques.ThebookservesasbothatheoreticalandpracticalguidetotakeyouthroughtheimportantaspectsofSQLinjection,bothfromanattackandadefenseperspective.You’llstartwithathoroughintroductiontoSQLinjectionanditsimpactonwebsitesandsystems.Later,thebookfeaturesstepstoconfigureavirtualenvironment,soyoucantrySQLinjectiontechniquessafelyonyourowncomputer.ThesetestscanbeperformednotonlyonwebapplicationsbutalsoonwebservicesandmobileapplicationsthatcanbeusedformanagingIoTenvironments.Toolssuchassqlmapandothersarethencovered,helpingyouunderstandhowtousethemeffectivelytoperformSQLinjectionattacks.Bytheendofthisbook,youwillbewell-versedwithSQLinjection,fromboththeattackanddefenseperspective.
目錄(70章)
倒序
- 封面
- 版權信息
- Why subscribe?
- Contributors About the authors
- About the reviewers
- Packt is searching for authors like you
- Preface
- Section 1: (No)SQL Injection in Theory
- Chapter 1: Structured Query Language for SQL Injection
- Technical requirements
- An overview of SQL – a relational query language
- The syntax and logic of SQL
- Security implications of SQL
- Weaknesses in the use of SQL
- SQL for SQL injection – a recap
- Summary
- Questions
- Chapter 2: Manipulating SQL – Exploiting SQL Injection
- Technical requirements
- Exploitable SQL commands and syntax
- Common SQL injection commands and manipulation
- Not only SQL injection – non-relational repositories
- The injection vulnerability in non-relational repositories
- Wrapping up – (No-)SQL injection in theory
- Summary
- Questions
- Section 2: SQL Injection in Practice
- Chapter 3: Setting Up the Environment
- Technical requirements
- Understanding the practical approach and introducing the main tools
- Overview of the OWASP BWA project
- The attacker – configuring your client machine
- The target – configuring your target web applications
- The target – configuring your target-emulated devices
- Operating the lab
- Summary
- Questions
- Chapter 4: Attacking Web Mobile and IoT Applications
- Technical requirements
- Attacking traditional web applications– manual techniques
- Attacking traditional web applications – automated techniques
- Attacking mobile targets
- Attacking IoT targets
- Summary
- Questions
- Further reading
- Chapter 5: Preventing SQL Injection with Defensive Solutions
- Technical requirements
- Understanding general weaknesses and SQL injection enablers
- Treating user input
- Sanitization and input control
- Defending against SQL injection – code-level defenses
- Defending against SQL injection – platform-level defenses
- Summary
- Questions
- Chapter 6: Putting It All Together
- SQL injection – theory in perspective
- SQL injection – practice in perspective
- SQL injection and security implications – final comments
- Summary
- Questions
- Assessments
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時間:2021-06-18 18:34:39
推薦閱讀
- 云原生安全:攻防實踐與體系構建
- 信息安全導論(在線實驗+在線自測)
- 數據恢復方法及案例分析
- 工業控制網絡安全技術
- 硬黑客:智能硬件生死之戰
- 網絡安全能力成熟度模型:原理與實踐
- 從實踐中學習Kali Linux滲透測試
- CTF那些事兒
- 人工智能安全(精裝版)
- 黑客攻防實戰從入門到精通
- Mastering Metasploit
- 隱私保護機器學習
- 從實踐中學習Nmap滲透測試
- 黑客攻防入門
- Manga Studio 5 Beginner's Guide
- Hands-On Bug Hunting for Penetration Testers
- Web安全之機器學習入門
- 黑客與安全技術指南
- 零信任安全從入門到精通
- 應用密碼學:原理、分析與Python實現
- 計算機網絡安全(第2版)
- Mastering Mobile Forensics
- 白帽子安全開發實戰
- Kali Linux 2018:Assuring Security by Penetration Testing
- Hands-On Penetration Testing with Kali NetHunter
- 物聯網安全與隱私保護
- ATT&CK框架實踐指南
- 互聯網安全建設從0到1
- 網絡異常流量與行為分析
- 數據恢復實用技術