introduction:
As long occupied the first place in the OWASP Top 10 is injected, as to what is OWASP can refer to Baidu Encyclopedia OWASP
Introduction to SQL injection:
The so-called SQL injection, is inserted through the SQL command into the Web form submit or enter the domain name query string or page request, and ultimately deceive server to execute malicious SQL commands. Specifically, it is the use of existing applications, the (malicious) SQL command injection into the back-end database engine capacity of execution, it can enter the (malicious) SQL statements in a Web form to get on the site of a security vulnerability database, rather than to execute SQL statements in accordance with the designer intent. [1] For example, many video sites previously leaked VIP member password is mostly submit queries character storms out through the WEB form, these forms are particularly vulnerable to SQL injection *** .
Injection principle
Program command failed to make the right treatment resulted in unintended commands or perform data access to user input. Or causes injection is to accept the parameters is not properly processed directly into the database query operations. *** initiated injection requires the presence of controllable parameters (data) submitted by way of confirmation and SQL commands relevant points
Classification sql injection
The data transmission: GET type POST type COOKie type
according to the type of data: numeric, character
The injection pattern:
Based on the joint inquiry of the injection mode
based on the injection pattern of error
based on Boolean blinds
based on blind time Note
heap injection mode queries
General Procedure sql injection
The basic steps sql injection (This is consistent with the step sqlmap of it)
to determine what type of injection, there is no filter keyword, can bypass
Access to information database users, version, database currently connected
Obtain information about a database table
Gets column information
Finally get the data.