Posts: 12
Threads: 0
Joined: Jan 2024
Posts: 1
Threads: 0
Joined: Feb 2024
(Oct 24, 2023, 07:39 PM)HeySiRI Wrote: A Book (PDF) containing SQL Injection Strategies.
Book Information:
Author(s): Ettore Galluccio , Edoardo Caselli , Gabriele Lombari
Publication Date: July, 2020
Pages: 210
Publisher: Packt
ISBN: 9781839215643
Chapters/File Content(s):
Chapter 1: Structured Query Language for SQL Injection
Technical requirements
An overview of SQL – a relational query language
The syntax and logic of SQL
Security implications of SQL
Weaknesses in the use of SQL
SQL for SQL injection – a recap
Summary
Questions
Chapter 2: Manipulating SQL – Exploiting SQL Injection
Technical requirements
Exploitable SQL commands and syntax
Common SQL injection commands and manipulation
Not only SQL injection – non-relational repositories
The injection vulnerability in non-relational repositories
Wrapping up – (No-)SQL injection in theory
Summary
Questions
Chapter 3: Setting Up the Environment
Technical requirements
Understanding the practical approach and introducing the main tools
Overview of the OWASP BWA project
The attacker – configuring your client machine
The target – configuring your target web applications
The target – configuring your target-emulated devices
Operating the lab
Summary
Questions
Chapter 4: Attacking Web, Mobile, and IoT Applications
Technical requirements
Attacking traditional web applications– manual techniques
Attacking traditional web applications – automated techniques
Attacking mobile targets
Attacking IoT targets
Summary
Questions
Further reading
Chapter 5: Preventing SQL Injection with Defensive Solutions
Technical requirements
Understanding general weaknesses and SQL injection enablers
Treating user input
Sanitization and input control
Defending against SQL injection – code-level defenses
Defending against SQL injection – platform-level defenses
Summary
Questions
Chapter 6: Putting It All Together
SQL injection – theory in perspective
SQL injection – practice in perspective
SQL injection and security implications – final comments
Summary
Questions
Assessments
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
More Information:
Quote:https://www.packtpub.com/product/sql-inj...trategies/
SHA-1 CHECKSUM: 0CBCC2A349A5430C61E2CCA65716BDBC1922B434
Downloads:
Worth a look
Posts: 7
Threads: 0
Joined: Feb 2024
Posts: 80
Threads: 6
Joined: Dec 2023
i'm curious to see if it's better or have any tips with sqlmap
Posts: 22
Threads: 0
Joined: Feb 2024
(Oct 24, 2023, 07:39 PM)HeySiRI Wrote: A Book (PDF) containing SQL Injection Strategies.
Book Information:
Author(s): Ettore Galluccio , Edoardo Caselli , Gabriele Lombari
Publication Date: July, 2020
Pages: 210
Publisher: Packt
ISBN: 9781839215643
Chapters/File Content(s):
Chapter 1: Structured Query Language for SQL Injection
Technical requirements
An overview of SQL – a relational query language
The syntax and logic of SQL
Security implications of SQL
Weaknesses in the use of SQL
SQL for SQL injection – a recap
Summary
Questions
Chapter 2: Manipulating SQL – Exploiting SQL Injection
Technical requirements
Exploitable SQL commands and syntax
Common SQL injection commands and manipulation
Not only SQL injection – non-relational repositories
The injection vulnerability in non-relational repositories
Wrapping up – (No-)SQL injection in theory
Summary
Questions
Chapter 3: Setting Up the Environment
Technical requirements
Understanding the practical approach and introducing the main tools
Overview of the OWASP BWA project
The attacker – configuring your client machine
The target – configuring your target web applications
The target – configuring your target-emulated devices
Operating the lab
Summary
Questions
Chapter 4: Attacking Web, Mobile, and IoT Applications
Technical requirements
Attacking traditional web applications– manual techniques
Attacking traditional web applications – automated techniques
Attacking mobile targets
Attacking IoT targets
Summary
Questions
Further reading
Chapter 5: Preventing SQL Injection with Defensive Solutions
Technical requirements
Understanding general weaknesses and SQL injection enablers
Treating user input
Sanitization and input control
Defending against SQL injection – code-level defenses
Defending against SQL injection – platform-level defenses
Summary
Questions
Chapter 6: Putting It All Together
SQL injection – theory in perspective
SQL injection – practice in perspective
SQL injection and security implications – final comments
Summary
Questions
Assessments
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
More Information:
Quote:https://www.packtpub.com/product/sql-inj...trategies/
SHA-1 CHECKSUM: 0CBCC2A349A5430C61E2CCA65716BDBC1922B434
Downloads: thanks for sharing This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Posts: 6
Threads: 1
Joined: Jan 2024
Posts: 119
Threads: 10
Joined: Jan 2024
SQL Injection vulnerabilities are still present in modern day web applications. Developers unfortunately still unable to patch it most of the time.
Posts: 58
Threads: 0
Joined: Nov 2023
(Oct 24, 2023, 07:39 PM)HeySiRI Wrote: A Book (PDF) containing SQL Injection Strategies.
Book Information:
Author(s): Ettore Galluccio , Edoardo Caselli , Gabriele Lombari
Publication Date: July, 2020
Pages: 210
Publisher: Packt
ISBN: 9781839215643
Chapters/File Content(s):
Chapter 1: Structured Query Language for SQL Injection
Technical requirements
An overview of SQL – a relational query language
The syntax and logic of SQL
Security implications of SQL
Weaknesses in the use of SQL
SQL for SQL injection – a recap
Summary
Questions
Chapter 2: Manipulating SQL – Exploiting SQL Injection
Technical requirements
Exploitable SQL commands and syntax
Common SQL injection commands and manipulation
Not only SQL injection – non-relational repositories
The injection vulnerability in non-relational repositories
Wrapping up – (No-)SQL injection in theory
Summary
Questions
Chapter 3: Setting Up the Environment
Technical requirements
Understanding the practical approach and introducing the main tools
Overview of the OWASP BWA project
The attacker – configuring your client machine
The target – configuring your target web applications
The target – configuring your target-emulated devices
Operating the lab
Summary
Questions
Chapter 4: Attacking Web, Mobile, and IoT Applications
Technical requirements
Attacking traditional web applications– manual techniques
Attacking traditional web applications – automated techniques
Attacking mobile targets
Attacking IoT targets
Summary
Questions
Further reading
Chapter 5: Preventing SQL Injection with Defensive Solutions
Technical requirements
Understanding general weaknesses and SQL injection enablers
Treating user input
Sanitization and input control
Defending against SQL injection – code-level defenses
Defending against SQL injection – platform-level defenses
Summary
Questions
Chapter 6: Putting It All Together
SQL injection – theory in perspective
SQL injection – practice in perspective
SQL injection and security implications – final comments
Summary
Questions
Assessments
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
More Information:
Quote:https://www.packtpub.com/product/sql-inj...trategies/
SHA-1 CHECKSUM: 0CBCC2A349A5430C61E2CCA65716BDBC1922B434
Downloads:
Thanks a lot for this tutto i appreciate This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Posts: 95
Threads: 45
Joined: Feb 2024
Posts: 11
Threads: 0
Joined: Mar 2024
Yeah I'm interesting, maybe I can to try it. Thanks bruh
|