Chapter 7
Advanced topics
Solutions in this chapter:
• Evading Input Filters
• Exploiting Second-Order SQL Injection
• Exploiting Client-Side SQL Injection
• Using Hybrid Attacks
Introduction
In the chapters so far, we have examined various techniques for finding, confirming, and exploiting SQL injection vulnerabilities in typical situations. Sometimes, however, you will encounter more challenging cases where you will need to expand these techniques to handle some unusual features of an application, or combine them with other exploits to deliver a successful attack.
In this chapter, we’ll explore more advanced techniques which you can use to enhance your SQL injection attacks, and to overcome obstacles that you may encounter. ...
Get SQL Injection Attacks and Defense, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.