Chapter 2
Testing for SQL Injection
Solutions in this chapter:
• Finding SQL Injection
• Confirming SQL Injection
• Automating SQL Injection Discovery
Introduction
As the presence of SQL injection is commonly tested for remotely (i.e., over the Internet as part of an application penetration test) you usually don’t have the opportunity to look at the source code to review the structure of the query into which you are injecting. This often leads to a need to perform much of your testing through inference—that is, “If I see this, then this is probably happening at the back end.”
This chapter discusses techniques for finding SQL injection issues from the perspective of a user sitting in front of his browser and interacting ...
Get SQL Injection Attacks and Defense, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.