O'Reilly logo

CEH® Certified Ethical Hacker Study Guide by Kimberly Graves

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Attacking Applications: SQL Injection and Buffer Overflows

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • What is SQL injection?

  • Understand the steps to conduct SQL injection

  • Understand SQL Server vulnerabilities

  • Describe SQL injection countermeasures

  • Overview of stack-based buffer overflows

  • Identify the different types of buffer overflows and methods of detection

  • Overview of buffer overflow mutation techniques

Attacking Applications: SQL Injection and Buffer Overflows

SQL injection is a hacking method used to attack SQL databases, whereas buffer overflows can exist in many different types of applications. SQL injection and buffer overflows are similar exploits in that they're both usually delivered via ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required