- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 207字
- 2021-07-16 17:53:18
SQLi and Other Code Injection Attacks – Accepting Unvalidated Data
SQLi is a rather old vulnerability. It's been two decades since the first public disclosures of the attack started appearing in 1998, detailed in publications such as Phrack, but it persists, often in critically damaging ways. SQLi vulnerabilities can allow an attacker to read sensitive data, update database information, and sometimes even issue OS commands. As OWASP succinctly states, the "flaw depends on the fact that SQL makes no real distinction between the control and data planes." This means that SQL commands can modify both the data they contain and parts of the underlying system running the software, so when the access prerequisites for a feature such as sqlmap's --os-shell flag are present, a SQLi flaw can be used to issue system commands.
Many tools and design patterns exist for preventing SQLi. But the pressure of getting new applications to market and iterating quickly on features means that SQLi-vulnerable inputs don't get audited, and the procedures to prevent the bug are never put into place.
As a vulnerability endemic to one of the most common languages for database development and as an easily detected, easily exploited, and richly rewarded bug, SQLi is a worthy subject for study.
- Android應用安全實戰:Frida協議分析
- Web漏洞分析與防范實戰:卷1
- INSTANT Netcat Starter
- 腦洞大開:滲透測試另類實戰攻略
- 深入淺出隱私計算:技術解析與應用實踐
- 數字安全藍皮書:本質屬性與重要特征
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- 網絡安全三十六計:人人該懂的防黑客技巧
- Spring Security(Third Edition)
- Digital Forensics with Kali Linux
- 網絡安全與攻防入門很輕松(實戰超值版)
- Bug Bounty Hunting Essentials
- Practical Mobile Forensics
- Manga Studio 5 Beginner's Guide
- 動態賦能網絡空間防御