O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

We can find many ways to optimize our SQL injection applications. For instance, we can test for commonly-used table or column names before running a per-byte check on a server. This chapter provides an easy insight into how to craft an SQL injection tool that suits our needs. SQL injection is an art form. It takes intuition, creativity, experience, and solid background knowledge of all technologies involved to master it. In the next chapter, we move on to other methods of web application penetration testing with Perl, such as cross-site scripting, content management system vulnerabilities, and file inclusion attacks.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required