SQL Mapping

  • Sanjib Sinha


In this chapter, you will take a detailed look at how you can avoid being hacked by a sniffer; in addition, you will learn how you can exploit SQL injection flaws and take over database servers. Crackers break into systems by injecting malformed SQL queries that map out the database column names. This is known as SQL mapping, with SQL injection being the technique by which they obtain this information. When you have a good grasp of SQL mapping, you can defend your system from such attacks.

Copyright information

© Sanjib Sinha 2018

Authors and Affiliations

  • Sanjib Sinha
    • 1
  1. 1.HowrahIndia

Personalised recommendations