Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying SQL Injection Strategies
  • Table Of Contents Toc
SQL Injection Strategies

SQL Injection Strategies

By : Galluccio, Gabriele Lombari, Caselli, Lombari
5 (1)
close
close
SQL Injection Strategies

SQL Injection Strategies

5 (1)
By: Galluccio, Gabriele Lombari, Caselli, Lombari

Overview of this book

SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective. You’ll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks. By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective.
Table of Contents (11 chapters)
close
close
1
Section 1: (No)SQL Injection in Theory
4
Section 2: SQL Injection in Practice

Chapter 3: Setting Up the Environment

In this chapter, we are covering the setup of the test environment that will be used in the core of the practical part, while also defining the main approach behind the practical section of this book. The main tools used will also be introduced; we'll describe their ability to perform our SQL injection tests, which will help us understand the subject matter even more.

After introducing the main methodology and tools, we will also show how to configure the lab settings that will be used. In order to best configure both the client, from which we will be conducting our test attacks, and the server side, made up of virtual targets we are conducting our tests against, this chapter serves as a step-by-step guide for configuration. Luckily, we have selected tools that are, for the most part, ready to use, and the setup is relatively simple.

As the client part will be mostly the same both for web application attacks and emulated devices, the...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
SQL Injection Strategies
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon