SQL Injection - Forms and Validity

Forms and Validity

SQL injection attack (SQLIA) is considered one of the top 10 web application vulnerabilities of 2007 and 2010 by the Open Web Application Security Project. The attacking vector contains five main sub-classes depending on the technical aspects of the attack's deployment:

  • Classic SQLIA
  • Inference SQL injection
  • Interacting with SQL injection
  • Database management system-specific SQLIA
  • Compounded SQLIA


  • SQL injection + insufficient authentication
  • SQL injection + DDoS attacks
  • SQL injection + DNS hijacking
  • SQL injection +XSS

A complete overview of the SQL Injection classification is presented in the next figure. The Storm Worm is one representation of Compounded SQLIA.

This classification represents the state of SQLIA, respecting its evolution until 2010—further refinement is underway.

Read more about this topic:  SQL Injection

Famous quotes containing the words forms and/or validity:

    Psychoanalysis can unravel some of the forms of madness; it remains a stranger to the sovereign enterprise of unreason. It can neither limit nor transcribe, nor most certainly explain, what is essential in this enterprise.
    Michel Foucault (1926–1984)

    It does not follow, because our difficulties are stupendous, because there are some souls timorous enough to doubt the validity and effectiveness of our ideals and our system, that we must turn to a state controlled or state directed social or economic system in order to cure our troubles.
    Herbert Hoover (1874–1964)