Lec 10: Web Security I: SQL injection Flashcards
How do websites work?

(T/F): Most database and web scripting languages are untyped
True
How can attackers exploit unforeseen user input?

What is SQL and what is it used for? What are the data types normally used?

How does SQL get used on the Web?

What is the problem with this code?


What is an input validation vulnerability and how does it work?


Give back everything on user savage

Comments out code after query

Always true so gives you any info you want
What are the different parts of HTTP in a URL?

What is URL encoding?

Why is URL encoding/user input into SQL a problem for more than authentication?

What is the problem with this?


What can you do to protect from unvalidated input issues?

What is input Validation?
Strip out comments and (if possible) SQL keywords from input
What is the problem with just stripping out quote in Input Validation?
What about names like O’Brien? Would not work for all possible valid inputs.
What is better escaping input validation?

What is the problem with better escaping input validation?
Quoting problems through cannonicalization (replacing ‘ with equivalent ASCII or other equivalents)
What is integer field input validation?

What are integer field validation issues?

What is second-order SQL injection?

What is an example of second-order SQL injection?

What are prepared statements?





