Difference between revisions of "SQL injection (SQLi)"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(This Documentation explains SQL injection, different types of SQL injection attacks and How these attacks can be prevented.)
 
Line 1: Line 1:
== Summary ==  
== Summary ==  
 
This Document explains SQL injection, how it can be performed, different types of SQL attacks, and these types of attacks can be prevented.
 
 
== Requirements ==
== Requirements ==


Line 42: Line 40:
* https://google.com
* https://google.com


[[Category:Documentation]]
[[Category:Penetesting]]

Revision as of 12:53, 9 December 2021

Summary

This Document explains SQL injection, how it can be performed, different types of SQL attacks, and these types of attacks can be prevented.

Requirements

  • Operating system: Ubuntu 18.04 bionic amd64
  • Packages: git emacs

In order to complete these steps, you must have followed Some Other Documentation before.

Description

Step 1

Enter these commands in the shell

echo foo
echo bar

Step 2

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Used Hardware

Device to be used with this documentation Maybe another device to be used with this documentation

Courses

References