-
Notifications
You must be signed in to change notification settings - Fork 1
/
post4.html
93 lines (78 loc) · 4.66 KB
/
post4.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<meta content="IE=edge,chrome=1" http-equiv="X-UA-Compatible">
<title>Python / Hailsa Blog</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta property="og:type" content="" />
<meta property="og:url" content="" />
<meta property="og:title" content="" />
<meta property="og:image" content="" />
<meta property="og:description" content="" />
<meta name="twitter:site" content="">
<meta name="twitter:creator" content="">
<meta name="twitter:title" content="">
<meta name="twitter:description" content="">
<link href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet">
<link href="https://fonts.googleapis.com/css?family=Lato" rel="stylesheet" type="text/css">
<link href="./styles/styles.css" rel="stylesheet">
<link rel="shortcut icon" href="./img/hailsa.jpg" type="image/x-icon">
</head>
<body>
<!-- BEGIN BLOG HEADER -->
<div class="section-blog-header">
<div class="container">
<div class="row">
<div class="col-md-10 col-md-offset-1 col-sm-12">
<h3>hailsa blog</h3>
</div>
</div>
</div>
</div>
<!-- END BLOG HEADER -->
<!-- BEGIN BLOG POST -->
<div class="section-blog-post">
<div class="container">
<div class="row">
<div class="col-sm-12">
<div class="post-container">
<a class="back" href="./index.html">Back to all posts</a>
<h1>What is an SQL injection?</h1>
<span class="by">Posted by <strong>hailsa</strong> on <strong>October 1, 2021</strong></span>
<div class="featured-image">
<img src="https://academy.avast.com/hs-fs/hubfs/New_Avast_Academy/SQL%20injection/What%20is%20a%20SQL%20injection.png?width=660&name=What%20is%20a%20SQL%20injection.png" width="100%">
</div>
<div class="post-body">
<p>Sql Injection or SQL Injection is a vulnerability that allows the attacker to send or "inject" SQL instructions in a malicious and malicious way.</p>
<img src="https://estradawebgroup.com/ImagesUpload/SQL-injection-attack-example.png" alt="">
<h1>Why an sql error occurs?</h1>
<p>An SQL error normally occurs with the bad filtering of the variables in a program that has or creates SQL, generally when you ask a user for inputs of any type and they are not validated, such as their name and password, but in exchange for this information the attacker sends an invasive SQL statement that will be executed against the database.</p>
<h1>Sql injection types</h1>
<p>An sql injection can be exploited in 2 different ways, manually, that is, the attacker will inject the script by hand in order to generate the action within the database. On the other hand we have the automated injection with sqlmap, sqlmap is a tool specially designed for this type of attack, it is in charge of analyzing the page, seeing if it is vulnerable and attacking, it is said that it is automated since the tool does everything by itself , the user only needs to enter the options they want to use to make the scan more effective.</p>
</div>
<div class="post-author">
<div class="headshot">
<img src="https://yt3.ggpht.com/HW4ocjMgfozv4Ds0hGlT9aGnuPFwsYHsInWjqPGFSzF_ms4HyX3l5mYmNpfFxDFsgkT5dl4KTQ=s600-c-k-c0x00ffffff-no-rj-rp-mo" width="100%">
</div>
<p><strong>About the author:</strong> Hailsa, a guy who wants to learn cybersecurity and create the biggest company to help to keep save the cyber world. I am 18 years old and I am about to start the college and tain me as a informatic engineer.</p>
</div>
<div id="disqus_thread"></div>
<script type="text/javascript">
/* * * CONFIGURATION VARIABLES * * */
var disqus_shortname = 'buttercms';
/* * * DON'T EDIT BELOW THIS LINE * * */
(function() {
var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true;
dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js';
(document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq);
})();
</script>
</div>
</div>
</div>
</div>
</div>
</body>
</html>