Đang chuẩn bị liên kết để tải về tài liệu:
An Introduction to SQL Injection BY DAPIRATES & UNDERC LOSSIE I.T SECURITY FORUMS
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Tham khảo tài liệu 'an introduction to sql injection by dapirates & underc lossie i.t security forums', công nghệ thông tin, cơ sở dữ liệu phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | An Introduction to SQL Injection BY DAPIRATES UNDERC LOSSIE I.T SECURITY FORUMS dapirates at lossieit.co.uk Lossie I.T Security Forums CHAPTER 1 - Introduction What is SQL SQL pronounced ess-que-el stands for Structured Query Language. SQL is used to communicate with a database. According to ANSI American National Standards Institute it is the standard language for relational database management systems. SQL statements are used to perform tasks such as update data on a database or retrieve data from a database. Some common relational database management systems that use SQL are Oracle Sybase Microsoft SQL Server Access Ingres etc. Although most database systems use SQL most of them also have their own additional proprietary extensions that are usually only used on their system. However the standard SQL commands such as Select Insert Update Delete Create and Drop can be used to accomplish almost everything that one needs to do with a database. What is an SQL injection It is an attack technique used by hackers to exploit web sites by altering backend SQL statements through manipulating application input. SQL Injection happens when a developer accepts user input that is directly placed into a SQL Statement and doesn t properly filter out dangerous characters. This can allow an attacker to not only steal data from your database but also modify and delete it. Certain SQL Servers such as Microsoft SQL Server contain Stored and Extended Procedures database server functions . If an attacker can obtain access to these Procedures it may be possible to compromise the entire machine. Attackers commonly insert single quotes into a URL s query string or into a forms input field to test for SQL Injection. What could I gain from doing this Databases for websites contain a lot of information that could be very useful to an attacker .With such information there are many things you could gain. From usernames and passwords to the sites themselves including the admin details for the .