-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
CompTIA PenTest+ Study Guide
By :
Injection vulnerabilities are among the primary mechanisms that penetration testers use to break through a web application and gain access to the systems supporting that application. These vulnerabilities allow an attacker to supply some type of code to the web application as input and trick the web server into either executing that code or supplying it to another server to execute.
Cybersecurity professionals and application developers have several tools at their disposal to help protect against injection vulnerabilities. The most important of these is input validation. Applications that allow user input should perform validation of that input to reduce the likelihood that it contains an attack.
The most effective form of input validation uses input whitelisting, in which the developer describes the exact type of input that is expected from the user and then verifies that the input matches that specification before passing the input...
Change the font size
Change margin width
Change background colour