Book Image

SQL Injection Strategies

By : Ettore Galluccio, Edoardo Caselli, Gabriele Lombari
Book Image

SQL Injection Strategies

By: Ettore Galluccio, Edoardo Caselli, Gabriele Lombari

Overview of this book

SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective. You’ll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks. By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective.
Table of Contents (11 chapters)
1
Section 1: (No)SQL Injection in Theory
4
Section 2: SQL Injection in Practice

Summary

Here we are, at the end of this journey. After dealing with all the topics we've faced, but this time in a more synthetic fashion, you grasped some topics regarding information security and saw how even SQL injection, which you have hopefully mastered as a topic, can be relevant to the real world.

Now that you've reached the end of this book, feel free to explore information security topics in general or keep practicing in controlled environments. Our hope is that this experience sparked curiosity in you, thus inviting you to look at security topics in more detail.

We wish to thank you for reading this book and hope that you also had fun in the process. Feel free to use your emulated environment as you please to test for SQL injection. You can even use the applications from the OWASP BWA project to learn about other security issues. We recommend that you begin by exploring all that Mutillidae II has to offer by going through all the suggestions and guides provided...