April 2017
Intermediate to advanced
350 pages
8h 35m
English
After reading this chapter, you should now have a much better understanding of how SQL works and of its vulnerabilities. SQL has revolutionized the way users interact with relational databases, but has come at a great cost to security. As we learned from the attack examples, having weak database protection can lead to devastating results. It is always important to understand the different types of SQL injection attacks. For example, by reading this chapter you can now explain what a union-based SQL injection is and why hackers use this type of attack. Understanding how to recognize the behavior of the different types of attacks can allow for a greater response time to mitigate the attack. Many SQL attacks will go unnoticed until the ...