• Finding SQL Injection
• Confirming SQL Injection
• Automating SQL Injection Discovery
As the presence of SQL injection is commonly tested for remotely (i.e., over the Internet as part of an application penetration test) you usually don’t have the opportunity to look at the source code to review the structure of the query into which you are injecting. This often leads to a need to perform much of your testing through inference—that is, “If I see this, then this is probably happening at the back end.”
This chapter discusses techniques for finding SQL injection issues from the perspective of a user sitting in front of his browser and interacting ...