About 571 results
Open links in new tab
  1. What is SQL Injection? Tutorial & Examples | Web Security Academy

    What is SQL injection (SQLi)? SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. This can allow …

  2. What is Blind SQL Injection? Tutorial & Examples - PortSwigger

    Error-based SQL injection refers to cases where you're able to use error messages to either extract or infer sensitive data from the database, even in blind contexts.

  3. SQL injection UNION attacks | Web Security Academy - PortSwigger

    This is commonly known as a SQL injection UNION attack. The UNION keyword enables you to execute one or more additional SELECT queries and append the results to the original query.

  4. SQL injection - PortSwigger

    SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data …

  5. What is cross-site scripting (XSS) and how to prevent it? | Web ...

    What is the difference between XSS and SQL injection? XSS is a client-side vulnerability that targets other application users, while SQL injection is a server-side vulnerability that targets …

  6. SQL injection - PortSwigger

    This learning path introduces SQL injection (SQLi), a critical web vulnerability. You'll learn how to detect and exploit SQLi to uncover hidden data and manipulate application behavior, as well …

  7. SQL injection (second order) - PortSwigger

    SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data …

  8. Examining the database in SQL injection attacks - PortSwigger

    To exploit SQL injection vulnerabilities, it's often necessary to find information about the database. This includes: The type and version of the database ...

  9. What is OS command injection, and how to prevent it? - PortSwigger

    In this section, we explain what OS command injection is, and describe how vulnerabilities can be detected and exploited. We also show you some useful commands and techniques for …

  10. NoSQL injection | Web Security Academy - PortSwigger

    The methodology is similar to that used in SQL injection. However the nature of the attack varies significantly, as NoSQL databases use a range of query languages, types of query syntax, and …