Learn about how your application can be vulnerable to SQL injection attacks.
- A SQL injection attack is one…of the easiest attacks to prevent.…However, it's one of the least protected forms of attack,…because lots of sites are open to it.…The core of the attack is that a SQL command…is upended to the back end of a form field…in a web or an application front end,…usually through a website,…with the intent of breaking the original SQL script…that was going to execute and then running…a SQL script that was injected into the form field.…This happens most often when you have dynamically generated…SQL within your front end application.…
These attacks are most common…with legacy ASP and PHP applications…but they are still a problem…with ASP.net web based applications.…The core reason behind these SQL injection attacks…comes down to poor coding practices,…both within the front and back,…and within the database stored procedure or dynamic SQL.…Many developers have learned better development practices…since ASP.net was released,…but SQL injection is still a big problem,…but between the number of legacy applications out there,…
Author
Released
9/11/2018- Building secure applications in SQL Server
- Configuring authentication in Azure AD
- Assigning user roles and privileges
- Building custom roles
- Creating contained users
- Protecting SQL Server from injection
- Identifying vulnerabilities
- Writing strong procedures
- Checking inputs
- Using dynamic parameterization
- Encrypting network connections
- Securing linked servers
- Configuring firewalls
Skill Level Beginner
Duration
Views
Related Courses
-
Learning SQL Server 2017
with Adam Wilbert1h 21m Beginner -
SQL Server 2017: Linux, Docker, and macOS
with Adam Wilbert1h 44m Intermediate -
SQL Server 2017: What's New
with Adam Wilbert1h 22m Beginner -
SQL Server Performance for Developers
with Joey D'Antoni3h 44m Intermediate
-
Introduction
-
Course software1m 33s
-
1. Roles and Privileges in SQL Server
-
Logins and users3m 39s
-
Least privileges principal4m 20s
-
Roles in Azure SQL Database2m 45s
-
Demo: Contained users2m 22s
-
-
2. SQL Injection
-
Overview of SQL injection2m 44s
-
-
3. Securing Your Network
-
Network security3m 58s
-
TLS 1.0 vs. TLS 1.23m 12s
-
Linked server security3m 37s
-
Demo: Linked servers3m 32s
-
Azure SQL Database firewalls3m 56s
-
-
Conclusion
-
Next steps13s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: SQL injection vulnerabilities