SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks (pdf)

$5.00

Author Ettore Galluccio, Edoardo Caselli, Gabriele Lombari
Edition 1
Edition Year 2020
Format PDF
ISBN 9781839215643
Language English
Number Of Pages 210
Publisher Packt Publishing

Description

Key Features

  • Understand SQL injection and its effects on websites and other systems
  • Get hands-on with SQL injection using both manual and automated tools
  • Explore practical tips for various attack and defense strategies relating to SQL injection

Book Description

SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective.

You’ll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks.

By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective.

Additional information

Author

Ettore Galluccio, Edoardo Caselli, Gabriele Lombari

Edition

1

Edition Year

2020

Format

PDF

ISBN

9781839215643

Language

English

Number Of Pages

210

Publisher

Packt Publishing

Reviews

There are no reviews yet.

Be the first to review “SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks (pdf)”

Your email address will not be published. Required fields are marked *