Files
Notes/src/Security/Training/Phase1/777_Web App Hacking: Hacking Authentication/module-1 - SQL Injection.txt

33 lines
692 B
Plaintext
Raw Normal View History

2021-02-20 19:25:30 -06:00
Overview:
-- Understanding SQL Injection
-- Demo
-- Fixing the Problem
:: Understanding SQL Injection ::
-- Tool(s) --
Inserting text that get processed by a processor
when not properly filtered out.
Ex:
SELECT * FROM uers WHERE email = 'ex@email.com'' and password = 'xyz'
'ex@email.com'' <-- gets processed and generates invalid sql.
SELECT * FROM uers WHERE email = 'ex@email.com' -- ' and password = 'xyz'
'ex@email.com' -- ' <-- Whatever is written after --<space>
comments out password verification
:: Demo ::
-- Tool(s) --
:: Fixing the Problem ::
-- Tool(s) --
Parameterize the query