• Evading Input Filters
• Exploiting Second-Order SQL Injection
• Exploiting Client-Side SQL Injection
• Using Hybrid Attacks
In the chapters so far, we have examined various techniques for finding, confirming, and exploiting SQL injection vulnerabilities in typical situations. Sometimes, however, you will encounter more challenging cases where you will need to expand these techniques to handle some unusual features of an application, or combine them with other exploits to deliver a successful attack.
In this chapter, we’ll explore more advanced techniques which you can use to enhance your SQL injection attacks, and to overcome obstacles that you may encounter. ...