Difference between revisions of "SQL injection (SQLi)"
Jump to navigation
Jump to search
(This Documentation explains SQL injection, different types of SQL injection attacks and How these attacks can be prevented.) |
|||
Line 1: | Line 1: | ||
== Summary == | == Summary == | ||
This Document explains SQL injection, how it can be performed, different types of SQL attacks, and these types of attacks can be prevented. | |||
== Requirements == | == Requirements == | ||
Line 42: | Line 40: | ||
* https://google.com | * https://google.com | ||
[[Category: | [[Category:Penetesting]] |
Revision as of 12:53, 9 December 2021
Summary
This Document explains SQL injection, how it can be performed, different types of SQL attacks, and these types of attacks can be prevented.
Requirements
- Operating system: Ubuntu 18.04 bionic amd64
- Packages: git emacs
In order to complete these steps, you must have followed Some Other Documentation before.
Description
Step 1
Enter these commands in the shell
echo foo echo bar
Step 2
Make sure to read
- War and Peace
- Lord of the Rings
- The Baroque Cycle
Used Hardware
Device to be used with this documentation Maybe another device to be used with this documentation
Courses
- A course where this documentation was used (2017, 2018)
- Another one (2018)