Web applications attacks/Command injection

From aldeid
Jump to navigation Jump to search

Description

Incomplete.png
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.

Examples

Protection

  • Control and purify data that are sent from the browser on server-side.
  • Enforce coding standards: Use prepared statements and stored procedures to avoid SQL injections
  • Use mysql_real_escape_string() function.
  • Use white lists input validation

Tools

Comments