![]() 作者:Clarke, Justin 出版社: Elsevier 副标题: 2nd Edition 出版年: 2012-6-18 页数: 576 定价: $ 67.74 ISBN: 9781597499637 内容简介 · · · · · ·"SQL Injection Attacks and Defense, First Edition": Winner of the Best Book Bejtlich Read Award. "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage". (Richard Bejtlich, Tao Security blog). SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the I... 作者简介 · · · · · ·Justin Clarke (CISSP, CISM, CISA, MCSE, CEH) is a cofounder and executive director of Gotham Digital Science, based in the United Kingdom. He has over ten years of experience in testing the security of networks, web applications, and wireless networks for large financial, retail, and technology clients in the United States, the United Kingdom and New Zealand. 目录 · · · · · ·AcknowledgementsDedication Contributing Authors Lead Author and Technical Introduction to the 2nd Edition Chapter 1. What Is SQL Injection? · · · · · ·() Acknowledgements Dedication Contributing Authors Lead Author and Technical Introduction to the 2nd Edition Chapter 1. What Is SQL Injection? Introduction Understanding How Web Applications Work Understanding SQL Injection Understanding How It Happens Summary Solutions Fast Track Chapter 2. Testing for SQL Injection Introduction Finding SQL Injection Confirming SQL Injection Automating SQL Injection Discovery Summary Solutions Fast Track Chapter 3. Reviewing Code for SQL Injection Introduction Reviewing source code for SQL injection Automated source code review Summary Solutions fast track Chapter 4. Exploiting SQL injection Introduction Understanding common exploit techniques Identifying the database Extracting data through UNION statements Using conditional statements Enumerating the database schema Injecting into “INSERT” queries Escalating privileges Stealing the password hashes Out-of-band communication SQL injection on mobile devices Automating SQL injection exploitation Summary Solutions Fast Track Chapter 5. Blind SQL Injection Exploitation Introduction Finding and confirming blind SQL injection Using time-based techniques Using Response-Based Techniques Using Alternative Channels Automating blind SQL injection exploitation Summary Solutions fast track Chapter 6. Exploiting the operating system Introduction Accessing the file system Executing operating system commands Consolidating access Summary Solutions fast track References Chapter 7. Advanced topics Introduction Evading input filters Exploiting second-order SQL injection Exploiting client-side SQL injection Using hybrid attacks Summary Solutions fast track Chapter 8. Code-level defenses Introduction Domain Driven Security Using parameterized statements Validating input Encoding output Canonicalization Design Techniques to Avoid the Dangers of SQL Injection Summary Solutions fast track Chapter 9. Platform level defenses Introduction Using runtime protection Securing the database Additional deployment considerations Summary Solutions fast track Chapter 10. Confirming and Recovering from SQL Injection Attacks Introduction Investigating a suspected SQL injection attack So, you’re a victim—now what? Summary Solutions fast track Chapter 11. References Introduction Structured query language (SQL) primer SQL injection quick reference Bypassing input validation filters Troubleshooting SQL injection attacks SQL injection on other platforms Resources Solutions fast track Index · · · · · · () |
感觉学到了非常多的知识
思想很新颖
内容严谨
值得一看