Summary
After reading this chapter, you should now have a much better understanding of how SQL works and of its vulnerabilities. SQL has revolutionized the way users interact with relational databases, but has come at a great cost to security. As we learned from the attack examples, having weak database protection can lead to devastating results. It is always important to understand the different types of SQL injection attacks. For example, by reading this chapter you can now explain what a union-based SQL injection is and why hackers use this type of attack. Understanding how to recognize the behavior of the different types of attacks can allow for a greater response time to mitigate the attack. Many SQL attacks will go unnoticed until the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access