Skip to Main Content
Google Hacking for Penetration Testers
book

Google Hacking for Penetration Testers

by Johnny Long
December 2004
Intermediate to advanced content levelIntermediate to advanced
448 pages
16h 25m
English
Syngress
Content preview from Google Hacking for Penetration Testers
This is a common way of building queries—by concatenating the variable
portions of the query with the static portions. With this example, the query is
expecting a string from the browser, so it first builds the select statement with the
initial leading single quote necessary. It then reads the post data from the request
and appends the value specified in the “Search” parameter to the query. It finally
appends the final trailing single quote it needs.
Let’s look at the way various inputs affect this statement. Remember that the
base query is:
Select patient_records from tblPatients where user_search='input'
So if the data entered into the “Search” post data ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Google Hacks

Google Hacks

Tara Calishain, Rael Dornfest
Dissecting the Hack

Dissecting the Hack

Jayson E Street

Publisher Resources

ISBN: 1931836361