SQL Injection - Forms and Validity

Forms and Validity

SQL injection attack (SQLIA) is considered one of the top 10 web application vulnerabilities of 2007 and 2010 by the Open Web Application Security Project. The attacking vector contains five main sub-classes depending on the technical aspects of the attack's deployment:

  • Classic SQLIA
  • Inference SQL injection
  • Interacting with SQL injection
  • Database management system-specific SQLIA
  • Compounded SQLIA


  • SQL injection + insufficient authentication
  • SQL injection + DDoS attacks
  • SQL injection + DNS hijacking
  • SQL injection +XSS

A complete overview of the SQL Injection classification is presented in the next figure. The Storm Worm is one representation of Compounded SQLIA.

This classification represents the state of SQLIA, respecting its evolution until 2010—further refinement is underway.

Read more about this topic:  SQL Injection

Famous quotes containing the words forms and/or validity:

    All ... forms of consensus about “great” books and “perennial” problems, once stabilized, tend to deteriorate eventually into something philistine. The real life of the mind is always at the frontiers of “what is already known.” Those great books don’t only need custodians and transmitters. To stay alive, they also need adversaries. The most interesting ideas are heresies.
    Susan Sontag (b. 1933)

    There are ... two minimum conditions necessary and sufficient for the existence of a legal system. On the one hand those rules of behavior which are valid according to the system’s ultimate criteria of validity must be generally obeyed, and on the other hand, its rules of recognition specifying the criteria of legal validity and its rules of change and adjudication must be effectively accepted as common public standards of official behavior by its officials.
    —H.L.A. (Herbert Lionel Adolphus)