O'Reilly logo

SQL Injection Attacks and Defense, 2nd Edition by Justin Clarke-Salt

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

Confirming and Recovering from SQL Injection Attacks

Kevvie Fowler

Solutions in this chapter:

• Investigating a Suspected SQL Injection Attack

• So, You’re a Victim—Now What?

Introduction

SQL injection is the attack of choice for hackers and is used in many of the information security breaches that continue to create headlines week after week. These breaches often cause devastating damage to an organization’s reputation and carry financial penalties and loss of business which can force a firm out of business. With businesses facing these consequences they often task information security professionals with proactively detecting and leading the remediation of SQL injection vulnerabilities within their applications. In many organizations ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required