Software and Web Security 2
Injection Attacks on Server
(Section 7.3 in book + some extra stuff; Note: we skipped 7.2 for now)
sws2 1
Injection Attacks on Server (Section 7.3 in book + some extra stuff; - - PowerPoint PPT Presentation
Software and Web Security 2 Injection Attacks on Server (Section 7.3 in book + some extra stuff; Note: we skipped 7.2 for now) sws2 1 Recall: dynamically created web pages y y g Virtually all web pages you see are dynamically created
sws2 1
sws2 2
sws2 3
sws2 4
sws2 5
sws2 6
sws2 7
sws2 8
sws2 9
sws2 10
sws2 11
sws2 12
sws2 13
sws2 14
sws2 15
16 sws2
17 sws2
18 sws2
sws2 19
20 sws2
21 sws2
sws2 22
sws2 23
24 sws2
25 sws2
sws2 26
sws2 27
sws2 28
29 sws2
30 sws2
31 sws2
32 sws2
33 sws2
34 sws2
sws2 35
36 sws2
37 sws2
38 sws2
sws2 39
40 sws2
sws2 41
42 sws2
sws2 43
44 sws2
45 sws2
46 sws2
sws2 47
48 sws2
49 sws2
sws2 50
sws2 51
sws2 52
sws2 53
sws2 54
sws2 55
sws2 56
escaping/quoting is wrongheaded and downright dangerous. Different types of content have different special chars and different ways of escaping them, and what works in one tends to have side effects elsewhere. Any code ... that pretends to work like magic quotes - y p g q
wrongheaded and dangerous. Magic quotes .... exist so a PHP noob can fumble along and write some mysql queries that g q g y q q kinda work, without having to learn about escaping/quoting data properly. They prevent a few accidental syntax errors, but won't stop a malicious and semi-knowledgeable attacker .... And that poor noob may never even know how or why his database is now gone, because magic quotes gave him a false sense of security. He never had to learn how to g q g y really handle untrusted input. Data should be escaped where you need it escaped, and for the domain in which it will be
( y q _ _ p _ g y ( y y have a clue and use prepared statements), htmlentities or htmlspecialchars for HTML, etc.) Anything else is doomed to failure.” [Source http://php.net/manual/en/security.magicquotes.php]
sws2 57
sws2 58
sws2 59
sws2 60
sws2 61
sws2 62
sws2 63