Types of Injection:
- SQL Injection
- LDAP Injection
- OS Injection
1.SQL Injection: In SQL injection, attacker take advantage of badly configured database. i.e. if you pass any data to the database it will take it as a query instead of taking it as a data and it will execute that query to give some result to the end user.
Taking advantage of SQL injection, any person/attacker can access the database or even in worst condition, he can manipulate or delete data.
Types of SQLi:
Taking advantage of SQL injection, any person/attacker can access the database or even in worst condition, he can manipulate or delete data.
Types of SQLi:
- Error based SQLi
- Blind SQLi
- Boolean
- Time Base
Impact of SQLi:
- Attack on Confidentiality
- Attack on Integrity
- Attack on Availability
LDAP injection attacks are based on similar techniques to SQL
injection attacks.
3.OS Injection: OS injection or OS command injection vulnerability occurs when a developer
uses invalidated user controlled parameters to execute operating system
commands. OS command injection vulnerabilities allow attackers to run arbitrary
commands on the remote server.
Detectability : Average
Exploitability : Easy
Impact : Severe
How to Prevent:
- Use a Safe API
- Carefully escape special characters using the specific escape syntax.
- Implement “White list” input validation.
No comments:
Post a Comment