The SQL Injection is a code-injection technology;
utilize to attack the data-driven utilities, in which spiteful SQL
expressions are added into an appearance field for performance & it must feat asecurity exposure in an application’s software.
- First find out the exposure or vulnerable website, by using ‘Dorks’, you can do it. These are input query into a find engine, which effort to locate websites with the given text stored in the dork.
- A Dork utilizes search engine’s ‘inurl’ divinity/command to revisit websites, which have a detailed bunch of exposure words in ‘URL’.
- Now test the website for vulnerabilities.
- Then find out number of rows or columns fields. Defenseless columns permit us to suggest commands & queries to the SQL database via URL.
0 comments:
Post a Comment