Finding SQL Injection Bugs
In the most obvious cases, a SQL injection flaw may be discovered and con-
clusively verified by supplying a single item of unexpected input to the appli-
cation. In other cases, bugs may be extremely subtle and may be difficult to
distinguish from other categories of vulnerability or from benign anomalies
that do not present any security threat. Nevertheless, there are various steps
that you can carry out in an ordered way to reliably verify the majority of SQL
injection flaws.
N OT E
In your application mapping exercises (see Chapter 4), you should have
identified instances where the application appears to be accessing a back-end
database, and all of these need to be probed for SQL injection flaws. In fact,
absolutely any item of data submitted to the server may be passed to database
Do'stlaringiz bilan baham: |