官术网_书友最值得收藏!

SQL, Code Injection, and Scanners

Code injection is when unvalidated data is added (injected) into a vulnerable program and executed. Injection can occur in SQL, NoSQL, LDAP, XPath, NoSQL, XML parsers, and even through SMTP headers.

The XSS vulnerabilities discussed in the previous chapter are also examples of code injection. When an unsanitized HTML tag with malicious code in its attribute is added to a web application's database via a comment thread or discussion board submission, that code is injected into the application and executed when other users view that same comment or discussion.

For the purposes of this chapter though, we're going to focus on detecting and preventing code injection attacks related to databases—SQL and NoSQL, respectively. We'll cover how to use CLI tools to test a form input for SQLi vulnerabilities, how to use similar techniques for NoSQLi, scanning for both SQLi and other injection attacks, and best practices for avoiding damage to your target's database.

In this chapter, we will cover the following topics:

  • SQLi and other code injection attacks
  • Testing for SQLi with sqlmap
  • Trawling for bugs
  • Scanning for SQLi with Arachni
  • NoSQL injection
  • An end-to-end example of SQLi

主站蜘蛛池模板: 噶尔县| 东港市| 灯塔市| 重庆市| 凤庆县| 噶尔县| 安阳县| 厦门市| 阿巴嘎旗| 松阳县| 晋州市| 那曲县| 凤山市| 临安市| 阿城市| 大石桥市| 神木县| 闸北区| 加查县| 长岭县| 贡嘎县| 清水河县| 兴安县| 浑源县| 佛坪县| 安福县| 老河口市| 甘泉县| 交城县| 湘乡市| 宁南县| 通州区| 黑龙江省| 巩义市| 遂平县| 上林县| 三穗县| 左权县| 安平县| 维西| 湾仔区|