Second-order SQL injection
SQL second-order works differently; one page in the web application takes the malicious user input and some other function on some other page or some other application retrieves this malicious content and parses it as a part of the query. Automated scanners are unable to detect such issues. However, Burp has an implemented logic that helps an attacker find out SQL second-order vulnerabilities.
推薦閱讀
- 數據恢復方法及案例分析
- 數字身份與元宇宙信任治理
- 網絡空間攻防技術原理
- 特種木馬防御與檢測技術研究
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- Penetration Testing with Perl
- Mastering Kali Linux for Advanced Penetration Testing
- Kali Linux Network Scanning Cookbook(Second Edition)
- 云原生安全技術實踐指南
- 數據保護:工作負載的可恢復性
- 信息內容安全管理及應用
- Learn Azure Sentinel
- Practical Internet of Things Security
- Practical Mobile Forensics
- ATT&CK視角下的紅藍對抗實戰指南