- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 196字
- 2021-07-16 17:53:17
SQL, Code Injection, and Scanners
Code injection is when unvalidated data is added (injected) into a vulnerable program and executed. Injection can occur in SQL, NoSQL, LDAP, XPath, NoSQL, XML parsers, and even through SMTP headers.
The XSS vulnerabilities discussed in the previous chapter are also examples of code injection. When an unsanitized HTML tag with malicious code in its attribute is added to a web application's database via a comment thread or discussion board submission, that code is injected into the application and executed when other users view that same comment or discussion.
For the purposes of this chapter though, we're going to focus on detecting and preventing code injection attacks related to databases—SQL and NoSQL, respectively. We'll cover how to use CLI tools to test a form input for SQLi vulnerabilities, how to use similar techniques for NoSQLi, scanning for both SQLi and other injection attacks, and best practices for avoiding damage to your target's database.
In this chapter, we will cover the following topics:
- SQLi and other code injection attacks
- Testing for SQLi with sqlmap
- Trawling for bugs
- Scanning for SQLi with Arachni
- NoSQL injection
- An end-to-end example of SQLi
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- 工業(yè)互聯(lián)網(wǎng)安全
- 為你護(hù)航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- CSO進(jìn)階之路:從安全工程師到首席安全官
- 黑客攻防技巧
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- Penetration Testing with Perl
- 反黑命令與攻防從新手到高手(微課超值版)
- Kali Linux Wireless Penetration Testing Cookbook
- Computer Forensics with FTK
- Testing and Securing Android Studio Applications
- CTF競賽權(quán)威指南(Pwn篇)
- Learning Devise for Rails
- API安全技術(shù)與實(shí)戰(zhàn)