Abstract
In this chapter, you will take a detailed look at how you can avoid being hacked by a sniffer; in addition, you will learn how you can exploit SQL injection flaws and take over database servers. Crackers break into systems by injecting malformed SQL queries that map out the database column names. This is known as SQL mapping, with SQL injection being the technique by which they obtain this information. When you have a good grasp of SQL mapping, you can defend your system from such attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Sanjib Sinha
About this chapter
Cite this chapter
Sinha, S. (2018). SQL Mapping. In: Beginning Ethical Hacking with Kali Linux. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3891-2_9
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3891-2_9
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3890-5
Online ISBN: 978-1-4842-3891-2
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books