Detecting and Exploiting SQL Injection Vulnerabilities

In Chapter 5, Password Testingwe learned about the different authentication methods, and we created a password brute forcing tool. In this chapter, we're going to learn about one of the most dangerous vulnerabilities that can affect web applications, SQL injection (SQLi).

In this chapter, we're going to take a look at:

  • Introduction to SQL injection
  • Detecting SQL injection issues
  • Exploiting a SQL injection to extract data
  • Advanced SQLi exploiting
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.25.32