Chapter 8

SQL Injection Attacks

Information in this chapter:

• What is an SQL Injection Attack?

• Why are SQL Injection Attacks so Successful?

• How to Protect Yourself from an SQL Injection Attack

• Cleaning Up the Database After an SQL Injection Attack

• Other Front End Security Issues

• Using xEvents to Monitor For SQL Injection

• Summary

What is an SQL Injection attack?

An SQL Injection attack is probably the easiest attack to prevent, while being one of the least protected against forms of attack. The core of the attack is that an SQL Command is appended to the back end of a form field in the Web or application front end (usually through a Website), with the intent of breaking the original SQL Script and then running the SQL Script that ...

Get Securing SQL Server, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.