- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 99字
- 2021-06-10 18:35:33
SQL Injection Vulnerabilities
This chapter is about SQL injection vulnerability, which is ranked most critical in nature by the OWASP. This chapter contains a detailed description of SQL injection, its types, and its attack vectors, followed by some of the most critical SQL injection cases identified in bug reports. I have analyzed the top six SQL injection reports on Hackerone and listed them by description and details.
We will cover the following topics in this chapter:
- SQL injection
- Types of SQL injection
- Goals of an SQL injection attack
- Uber SQLi
- Grab SQL injection
- Zomato SQL injection
- Localtapiola SQL injection
推薦閱讀
- 開發(fā)者的Web安全戒律:真實(shí)威脅與防御實(shí)踐
- .NET安全攻防指南(上冊)
- 云原生安全技術(shù)實(shí)踐指南
- 信息安全導(dǎo)論(第2版)
- 網(wǎng)絡(luò)安全態(tài)勢感知
- 信息技術(shù)基礎(chǔ):提高篇·實(shí)驗(yàn)與習(xí)題
- 數(shù)據(jù)安全架構(gòu)設(shè)計與實(shí)戰(zhàn)
- CTF特訓(xùn)營:技術(shù)詳解、解題方法與競賽技巧
- 黑客攻防從入門到精通
- Web代碼安全漏洞深度剖析
- 數(shù)據(jù)恢復(fù)技術(shù)深度揭秘
- 2010年中國互聯(lián)網(wǎng)網(wǎng)絡(luò)安全報告
- CCNA Security 210-260 Certification Guide
- 惡意軟件、Rootkit和僵尸網(wǎng)絡(luò)
- 大話數(shù)據(jù)恢復(fù)