Book Image

SQL Injection Strategies

By : Ettore Galluccio, Edoardo Caselli, Gabriele Lombari
Book Image

SQL Injection Strategies

By: Ettore Galluccio, Edoardo Caselli, Gabriele Lombari

Overview of this book

SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective. You’ll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks. By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective.
Table of Contents (11 chapters)
1
Section 1: (No)SQL Injection in Theory
4
Section 2: SQL Injection in Practice

Overview of the OWASP BWA project

OWASP keeps a plethora of sub-projects, fueled by the efforts of many people around the world, with the aim of improving the experience of security professionals around the globe and raising awareness of web application security issues. One of the problems that ethical hackers encounter is finding targets that are free to attack without consequence in order to put their knowledge to the test. In the past, some organizations, such as web application security software vendors, put specific web applications on the web to allow the testing of the capabilities of software, or just to educate the public on web application security in general. Some of these applications have been removed or have become progressively harder to find, probably because they were discontinued or were designed to test older versions of application security software. The OWASP BWA project was started to provide people with a collection of some of these web applications to be used...