- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 99字
- 2021-06-10 18:35:33
SQL Injection Vulnerabilities
This chapter is about SQL injection vulnerability, which is ranked most critical in nature by the OWASP. This chapter contains a detailed description of SQL injection, its types, and its attack vectors, followed by some of the most critical SQL injection cases identified in bug reports. I have analyzed the top six SQL injection reports on Hackerone and listed them by description and details.
We will cover the following topics in this chapter:
- SQL injection
- Types of SQL injection
- Goals of an SQL injection attack
- Uber SQLi
- Grab SQL injection
- Zomato SQL injection
- Localtapiola SQL injection
推薦閱讀
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險(xiǎn)與防范
- RESTful Java Web Services Security
- Node Security
- DevSecOps敏捷安全
- 數(shù)字身份與元宇宙信任治理
- CSO進(jìn)階之路:從安全工程師到首席安全官
- Penetration Testing with Perl
- Getting Started with FortiGate
- 安全技術(shù)運(yùn)營(yíng):方法與實(shí)踐
- 軟件開(kāi)發(fā)安全之道:概念、設(shè)計(jì)與實(shí)施
- 局域網(wǎng)交換機(jī)安全
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- 從實(shí)踐中學(xué)習(xí)密碼安全與防護(hù)
- 一本書(shū)讀透金融科技安全
- 5G網(wǎng)絡(luò)安全規(guī)劃與實(shí)踐