The so-called SQL injection is to insert a SQL command into a Web form to submit or enter a domain name or query string for a page request, and ultimately trick the server into executing malicious SQL commands.
Specifically, it is the ability to leverage existing applications to inject (malicious) SQL commands into the backend database engine for execution, which can be done through a web form Enter (malicious) SQL statements to obtain a database on a website with security vulnerabilities, rather than executing the SQL statements as intended by the designer. For example, many previous film and television websites leaked VIP member passwords, mostly by submitting query characters through WEB forms. Such forms are particularly vulnerable to SQL injection attacks.
SQL injection technology
Forced error generation
Identification of database type, version and other information is the basis of this type of attack The motivation lies. Its purpose is to collect database type, structure and other information to prepare for other types of attacks. It can be said to be a preparatory step for attacks. Obtain vulnerability information by exploiting the default error message returned by the application server.
Using non-mainstream channel technology
In addition to HTTP responses, data can be obtained through channels. However, most channels rely on the functions supported by the database to exist, so this The technology is not fully applicable to all database platforms. The non-mainstream channels for SQL injection mainly include email, DNS and database connections. The basic idea is: first package the SQL query, and then use the non-mainstream channels to feed the information back to the attacker.
Use special characters
Different SQL databases have many different special characters and variables, which can be obtained through some application systems that are insecurely configured or filtered poorly. Some useful information to provide directions for further attacks.
Use conditional statements
This method can be divided into three forms: content-based, time-based, and error-based. Generally, conditional statements are added after regular access, and the target of the attack is determined based on information feedback.
Using stored procedures
Through some standard stored procedures, while database vendors extend the functions of the database, the system can also interact with it. Some stored procedures can be defined by users. After collecting information such as the type and structure of the database through other types of attacks, commands to execute stored procedures can be constructed. This type of attack can often achieve the goals of remote command execution, privilege expansion, and denial of service.
Avoid input filtering technology
Although some filtering technologies can be used to prevent SQL injection for common encoding, there are many ways to avoid this situation. Open filtering, technical means that can generally achieve this include the use of SQL comments and dynamic queries, the use of truncation, the use of URL encoding and null bytes, the use of uppercase and lowercase variants, and expressions after nesting stripping, etc. With the help of these means, the inputted query can avoid input filtering, so that the attacker can obtain the desired query results.
Inference technology
can clarify the database schema, extract data and identify injectable parameters. This type of attack uses the feedback information input by the website to the user to infer the injectable parameters and database schema. After executing the query constructed by this attack, the answers obtained can only be true or false. Injection methods based on inference are mainly divided into two types: time-determined injection and blind injection. The former is to add statements such as "waitfor 100" to the injection statement, and determine whether the injection is successful and the derivation of the data value range based on the time when the query result appears; the latter is mainly "and l=l", "and l= 2” Two classic injection methods. These methods all ask questions that are indirectly related and can obtain responses, and then infer the desired information through the response information, and then carry out attacks.
The above is the detailed content of How to perform sql injection. For more information, please follow other related articles on the PHP Chinese website!

本篇文章给大家带来了关于SQL的相关知识,其中主要介绍了SQL Server使用CROSS APPLY与OUTER APPLY实现连接查询的方法,文中通过示例代码介绍的非常详细,下面一起来看一下,希望对大家有帮助。

本篇文章给大家带来了关于SQL server的相关知识,其中主要介绍了SQL SERVER没有自带的解析json函数,需要自建一个函数(表值函数),下面介绍关于SQL Server解析/操作Json格式字段数据的相关资料,希望对大家有帮助。

如何优化sql中的orderBy语句?下面本篇文章给大家介绍一下优化sql中orderBy语句的方法,具有很好的参考价值,希望对大家有所帮助。

monacoeditor创建//创建和设置值if(!this.monacoEditor){this.monacoEditor=monaco.editor.create(this._node,{value:value||code,language:language,...options});this.monacoEditor.onDidChangeModelContent(e=>{constvalue=this.monacoEditor.getValue();//使value和其值保持一致i

本篇文章给大家带来了关于SQL server的相关知识,开窗函数也叫分析函数有两类,一类是聚合开窗函数,一类是排序开窗函数,下面这篇文章主要给大家介绍了关于SQL中开窗函数的相关资料,文中通过实例代码介绍的非常详细,需要的朋友可以参考下。

0x01前言概述小编又在MySQL中发现了一个Double型数据溢出。当我们拿到MySQL里的函数时,小编比较感兴趣的是其中的数学函数,它们也应该包含一些数据类型来保存数值。所以小编就跑去测试看哪些函数会出现溢出错误。然后小编发现,当传递一个大于709的值时,函数exp()就会引起一个溢出错误。mysql>selectexp(709);+-----------------------+|exp(709)|+-----------------------+|8.218407461554972

当某些sql因为不知名原因堵塞时,为了不影响后台服务运行,想要给sql增加执行时间限制,超时后就抛异常,保证后台线程不会因为sql堵塞而堵塞。一、yml全局配置单数据源可以,多数据源时会失效二、java配置类配置成功抛出超时异常。importcom.alibaba.druid.pool.DruidDataSource;importcom.alibaba.druid.spring.boot.autoconfigure.DruidDataSourceBuilder;importorg.apache.

1.缘起最近项目在准备搞SASS化,SASS化有一个特点就是多租户,且每个租户之间的数据都要隔离,对于数据库的隔离方案常见的有数据库隔离,表隔离,字段隔离,目前我只用到表隔离和字段隔离(数据库隔离的原理也是差不多)。对于字段隔离比较简单,就是查询条件不同而已,比如像下面的SQL查询:SELECT*FROMt_demoWHEREtenant_id='xxx'ANDis_del=0但是为了严谨,需求上需要在执行SQL之前检查对应的表是否带上tenant_id的查询字段


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Zend Studio 13.0.1
Powerful PHP integrated development environment

Notepad++7.3.1
Easy-to-use and free code editor

Atom editor mac version download
The most popular open source editor

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.
