Chapter 2. Testing for SQL Injection
Solutions in this chapter:
▪ Confirming SQL Injection
▪ Automating SQL Injection Discovery
Frequently Asked Questions
As the presence of SQL injection is commonly tested for remotely (i.e., over the Internet as part of an application penetration test) you usually don't have the opportunity to look at the source code to review the structure of the query into which you are injecting. This often leads to a need to perform much of your testing through inference—that is, “If I see this, then this is probably happening at the back end.”
This chapter discusses techniques for finding SQL injection issues from the perspective of the user sitting in front of ...
Get SQL Injection Attacks and Defense now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.