Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Excellent Article: SQL Injection Attacks by Example


  • Please log in to reply
No replies to this topic

#1 harrywaldron

harrywaldron

    Security Reporter


  • Members
  • 509 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:03:18 AM

Posted 26 January 2005 - 07:55 AM

Steve Friedl, Microsoft MVP, developed an awesome and highly detailed article on how SQL Injection attacks work. DBAs and System Administrators need to be on the latest and greatest SPs and security updates for SQL-Server and other RDBMS's.

Excellent Article: SQL Injection Attacks by Example
http://www.unixwiz.net/techtips/sql-injection.html

SQL Injection is caused by unverified/unsanitized user input, and its main idea is to convince the application to run SQL code that it was not intended to run. If the application is creating SQL strings natively, i.e. on the fly, and then running them, it's straightforward to create some real surprises. There have been other papers on SQL injection, including some that are much more detailed, but this one shows the rationale of discovery as much as the process of exploitation.

BC AdBot (Login to Remove)

 


m



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users