According to OWASP top 10 vulnerabilities of 2010, SQL injection is the most dangerous and most common vulnerability around, A SQL Injection vulnerability occurs due to improper input validation or no input validation at all, what I mean by improper or no input validation is the user input is not filtered(for escape characters) before it gets passed to the SQL database, A Sql injection attack can be any many forms, but it's usually categorized into 3 types:

1. Inband
2. Out of band
3. Inferential

n this presentation john Mccray discusses some of advanced SQL Injection methods and topics such as IDS evasion, filter bypassing etc.

0 comments:

Post a Comment

Disclaimer

Disclaimer :
Piratemedia.info does not stores any files on its server. does not reserve any rights to the content listed on these pages. All references are copyright to their respective owners.

This blog does not host any of the files mentioned on this blog. This blog only points out to various links on the Internet that already exist and are uploaded by other websites or users there. If you have any clarifications to be made or If you find any contents in this site which you think can be offensive contact
us at pgnumber@gmail.com & the content will be removed or modified accordingly.
 
Top