第二课 sql注入及防护

常见获取变量

$_GET  $_POST $_COOKIE $_SERVER

is_numeric(),ctype_digit() 正则表达式

mysql_real_escape_string() vs addslashes()

http://www.w3school.com.cn/php/func_mysql_real_escape_string.asp

 

http://www.cnblogs.com/Safe3/archive/2008/08/22/1274095.html

http://php.net/manual/en/info.configuration.php

get_magic_quotes_gpc的举例:

if (!get_magic_quotes_gpc()) {

$lastname = addslashes($_POST[‘lastname’]);

} else {

$lastname = $_POST[‘lastname’];

}

 

测试sql注入

http://127.0.0.1/dvwa/vulnerabilities/sqli/?id=%27+union+select+user%2Cpassword+from+users%23&Submit=Submit

课后了解

http://www.w3school.com.cn/php/index.asp

猜你喜欢

转载自www.cnblogs.com/idebug/p/11042430.html
今日推荐