官术网_书友最值得收藏!

  • SQL Injection Strategies
  • Ettore Galluccio Edoardo Caselli Gabriele Lombari
  • 174字
  • 2021-06-18 18:34:28

Summary

So, to sum this up, let's take a look at what we covered in this chapter. SQL works using relationships, and it accepts a wide range of commands. We've also seen that, in general, some of these can be abused by malicious attackers. For this reason, we should keep security in mind when designing and developing applications that rely on databases. This chapter gave you a taste of the main security issues and possible solutions.

The next chapter will focus on what a malicious attacker can do by taking advantage of SQL capabilities. We will provide examples of this, all while dealing with aspects related to non-relational databases.

This first chapter, despite being more abstract, is essential for focusing on the main concepts behind SQL injection. Of course, this just an introduction to what we are going to cover throughout this book, but with more concrete examples. Be sure to keep these topics in mind when dealing with the practical aspects of SQL injection.

Our journey into SQL injection has only just begun!

主站蜘蛛池模板: 徐闻县| 宜兰县| 平阳县| 邯郸县| 布拖县| 上思县| 沂南县| 叶城县| 抚顺市| 玉门市| 广东省| 杂多县| 微山县| 大方县| 永胜县| 桐城市| 日土县| 原平市| 鞍山市| 万山特区| 石城县| 尉氏县| 永兴县| 梨树县| 乐业县| 江津市| 元江| 泌阳县| 皮山县| 浙江省| 龙川县| 始兴县| 大理市| 襄汾县| 景泰县| 柘城县| 兰溪市| 云梦县| 铁岭县| 汶上县| 灵武市|