Chapter 10

Confirming and Recovering from SQL Injection Attacks

Kevvie Fowler

Solutions in this chapter:

• Investigating a Suspected SQL Injection Attack

• So, You’re a Victim—Now What?

Introduction

SQL injection is the attack of choice for hackers and is used in many of the information security breaches that continue to create headlines week after week. These breaches often cause devastating damage to an organization’s reputation and carry financial penalties and loss of business which can force a firm out of business. With businesses facing these consequences they often task information security professionals with proactively detecting and leading the remediation of SQL injection vulnerabilities within their applications. In many organizations ...

Get SQL Injection Attacks and Defense, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.