A Deeper Look at SQL Injection

A Deeper Look at SQL Injection

1. What is SQL injection?

Sql injection is an attack method that adds sql code to the input parameter and passes it to the Sql server for parsing and execution.

2. How did it come about?

Web developers cannot guarantee that all input is sanitized

The attacker constructs executable SQL code using the input data sent to the SQL server

The database is not configured for security

3. How to find SQL vulnerabilities?

Identify all input points in a web application

Understand what types of requests trigger exceptions? (special characters " or ')

Detect anomalies in server responses

4. How to perform SQL injection attack?

Digital Injection:

Select * from tablename where id=1 or 1=1;

String injection:

MySQL's comment feature:

The characters after # and -- are commented out, so no matter what password is entered, it can be queried correctly. Please click here to enter image description

5. How to prevent SQL injection?

Strictly check the input format: is_numeric(var), tp5 validate verification, and use regular expressions to check whether the string is between [A-Za-z]

Escape: addslashes(str),

mysqli_escape_string() function to escape

6.MySQLi's precompilation mechanism

Parameterized Binding

Parameterized binding is another barrier to prevent SQL injection. PHP MySQLi and PDO both provide such functionality. For example, MySQLi can query like this:

PDO is even more convenient, for example:

You may also be interested in:
  • Java interview question analysis: judgment and prevention of SQL injection
  • SQL injection principles and solution code examples
  • Solve SQL injection problems through ibatis
  • Win2003 server anti-SQL injection artifact--D shield_IIS firewall
  • Sql injection tool_PowerNode Java Academy
  • Introduction to the Principle of Sql Injection_PowerNode Java Academy
  • How to find websites with SQL injection (must read)
  • Share a simple sql injection
  • Mybatis prevent sql injection example
  • Several solutions to prevent SQL injection when using Hibernate
  • Summary of 5 effective ways to prevent SQL injection
  • Summary of file reading and writing methods in SQL injection

<<:  How to generate a free certificate using openssl

>>:  How to write memory-efficient applications with Node.js

Recommend

URL Rewrite Module 2.1 URL Rewrite Module Rule Writing

Table of contents Prerequisites Setting up a test...

Some CSS questions you may be asked during an interview

This article is just to commemorate those CSS que...

How to use the WeChat Mini Program lottery component

It is provided in the form of WeChat components. ...

Detailed steps for setting up a nexus server

1. The significance of building nexus service As ...

Understand the basics of Navicat for MySQL in one article

Table of contents 1. Database Operation 2. Data T...

Docker online and offline installation and common command operations

1. Test environment name Version centos 7.6 docke...

The process of deploying and running countly-server in docker in win10

I have just come into contact with and become fam...

Public free STUN servers

Public free STUN servers When the SIP terminal us...

Implementation of Docker deployment of SQL Server 2019 Always On cluster

Table of contents Docker deployment Always on clu...

Simple example of using Docker container

Table of contents 1. Pull the image 2. Run the im...