Difference between revisions of "SQL injection (SQLi)"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 1: Line 1:
== Summary ==  
== Summary ==  
This Document explains SQL injection, how it can be performed, different types of SQL attacks, and these types of attacks can be prevented.
This Document explains SQL injection, how it can be performed, different types of SQL attacks, and the presentation methods.
== Requirements ==


* Operating system: Ubuntu 18.04 bionic amd64
* Operating system: Ubuntu 18.04 bionic amd64
Line 40: Line 39:
* https://google.com
* https://google.com


[[Category:Penetesting]]
[[Category:Documentations]]

Revision as of 12:57, 9 December 2021

Summary

This Document explains SQL injection, how it can be performed, different types of SQL attacks, and the presentation methods.

  • Operating system: Ubuntu 18.04 bionic amd64
  • Packages: git emacs

In order to complete these steps, you must have followed Some Other Documentation before.

Description

Step 1

Enter these commands in the shell

echo foo
echo bar

Step 2

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Used Hardware

Device to be used with this documentation Maybe another device to be used with this documentation

Courses

References