官术网_书友最值得收藏!

SQL, Code Injection, and Scanners

Code injection is when unvalidated data is added (injected) into a vulnerable program and executed. Injection can occur in SQL, NoSQL, LDAP, XPath, NoSQL, XML parsers, and even through SMTP headers.

The XSS vulnerabilities discussed in the previous chapter are also examples of code injection. When an unsanitized HTML tag with malicious code in its attribute is added to a web application's database via a comment thread or discussion board submission, that code is injected into the application and executed when other users view that same comment or discussion.

For the purposes of this chapter though, we're going to focus on detecting and preventing code injection attacks related to databases—SQL and NoSQL, respectively. We'll cover how to use CLI tools to test a form input for SQLi vulnerabilities, how to use similar techniques for NoSQLi, scanning for both SQLi and other injection attacks, and best practices for avoiding damage to your target's database.

In this chapter, we will cover the following topics:

  • SQLi and other code injection attacks
  • Testing for SQLi with sqlmap
  • Trawling for bugs
  • Scanning for SQLi with Arachni
  • NoSQL injection
  • An end-to-end example of SQLi

主站蜘蛛池模板: 武平县| 阿拉善左旗| 宜都市| 通化县| 武宁县| 安徽省| 旬邑县| 太仆寺旗| 遂川县| 金沙县| 巴马| 马尔康县| 叙永县| 巨野县| 阿城市| 仪陇县| 昭通市| 澎湖县| 新营市| 桃江县| 伽师县| 内黄县| 哈密市| 郴州市| 安泽县| 互助| 田阳县| 宁都县| 西林县| 上高县| 昭通市| 木里| 夏津县| 大厂| 徐汇区| 合阳县| 清水县| 平山县| 讷河市| 沿河| 昭觉县|