官术网_书友最值得收藏!

  • SQL Injection Strategies
  • Ettore Galluccio Edoardo Caselli Gabriele Lombari
  • 174字
  • 2021-06-18 18:34:28

Summary

So, to sum this up, let's take a look at what we covered in this chapter. SQL works using relationships, and it accepts a wide range of commands. We've also seen that, in general, some of these can be abused by malicious attackers. For this reason, we should keep security in mind when designing and developing applications that rely on databases. This chapter gave you a taste of the main security issues and possible solutions.

The next chapter will focus on what a malicious attacker can do by taking advantage of SQL capabilities. We will provide examples of this, all while dealing with aspects related to non-relational databases.

This first chapter, despite being more abstract, is essential for focusing on the main concepts behind SQL injection. Of course, this just an introduction to what we are going to cover throughout this book, but with more concrete examples. Be sure to keep these topics in mind when dealing with the practical aspects of SQL injection.

Our journey into SQL injection has only just begun!

主站蜘蛛池模板: 桂林市| 津南区| 中江县| 门源| 长泰县| 紫金县| 四川省| 中西区| 穆棱市| 山东省| 奉新县| 龙岩市| 渑池县| 新干县| 南和县| 二连浩特市| 龙门县| 柳州市| 西乌珠穆沁旗| 石狮市| 溧水县| 东乌| 和田市| 自贡市| 建始县| 建昌县| 海口市| 三门县| 太湖县| 白水县| 拜泉县| 石嘴山市| 镇坪县| 上犹县| 介休市| 长沙县| 崇左市| 延安市| 杂多县| 峨山| 湘潭县|