- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 196字
- 2021-07-16 17:53:17
SQL, Code Injection, and Scanners
Code injection is when unvalidated data is added (injected) into a vulnerable program and executed. Injection can occur in SQL, NoSQL, LDAP, XPath, NoSQL, XML parsers, and even through SMTP headers.
The XSS vulnerabilities discussed in the previous chapter are also examples of code injection. When an unsanitized HTML tag with malicious code in its attribute is added to a web application's database via a comment thread or discussion board submission, that code is injected into the application and executed when other users view that same comment or discussion.
For the purposes of this chapter though, we're going to focus on detecting and preventing code injection attacks related to databases—SQL and NoSQL, respectively. We'll cover how to use CLI tools to test a form input for SQLi vulnerabilities, how to use similar techniques for NoSQLi, scanning for both SQLi and other injection attacks, and best practices for avoiding damage to your target's database.
In this chapter, we will cover the following topics:
- SQLi and other code injection attacks
- Testing for SQLi with sqlmap
- Trawling for bugs
- Scanning for SQLi with Arachni
- NoSQL injection
- An end-to-end example of SQLi
- 網(wǎng)絡安全應急管理與技術(shù)實踐
- 隱私計算
- 可信計算3.0工程初步(第二版)
- 人工智能安全(精裝版)
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- 無線傳感器網(wǎng)絡安全與加權(quán)復雜網(wǎng)絡抗毀性建模分析
- 實用黑客攻防技術(shù)
- 持續(xù)集成:軟件質(zhì)量改進和風險降低之道
- VMware vCloud Security
- 隱私計算:推進數(shù)據(jù)“可用不可見”的關(guān)鍵技術(shù)
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)
- 云安全深度剖析:技術(shù)原理及應用實踐
- 反黑風暴:黑客社會工程學攻防演練
- 大數(shù)據(jù)時代的云安全
- 計算機病毒揭秘與對抗