Book Image

SQL Injection Strategies

By : Ettore Galluccio, Edoardo Caselli, Gabriele Lombari
Book Image

SQL Injection Strategies

By: Ettore Galluccio, Edoardo Caselli, Gabriele Lombari

Overview of this book

SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective. You’ll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks. By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective.
Table of Contents (11 chapters)
1
Section 1: (No)SQL Injection in Theory
4
Section 2: SQL Injection in Practice

Chapter 2

  1. SQL injection can be triggered through the use of specific characters that correspond, in SQL syntax, to specific functionalities, such as string delimiters, to terminate input strings before they are intended to. This inserts SQL code afterward, as well as comment characters, to make the system ignore entire parts of a query.
  2. An attacker could use a web form to insert arbitrary queries to return possibly relevant information. They could query default tables to see the database structure by appending the results to existing query results using UNION, as well as by commenting out the part of the query that would be used after the input was included.
  3. There are two ways in which an attacker could defeat user authentication: they could retrieve the password from a previous injection attack against the database, or they could trick the application by inserting an always true statement, resulting in a login success.
  4. Blind SQL injection is a SQL injection technique...