2021 OWASP Top Ten: Injection

preview_player
Показать описание
Injection attacks move down from the #1 spot on the 2017 list to the #3 spot on the 2021 list. Injection attacks refer to a broad class of attack vectors (not just SQL). In an injection attack, an attacker sends untrusted input to an application. This input gets processed by an interpreter as part of a command or query. In turn, this alters the execution of that program.

Injections are among the oldest and most dangerous attacks aimed at web applications. They can lead to data theft, data loss, loss of data integrity, denial of service, as well as full system compromise. John explains it all in this video, so check it out!
#OWASPTOP10

Video 4 / 11

⬇️⬇️⬇️ JOIN THE COMMUNITY! ⬇️⬇️⬇️

DevCentral is an online community of technical peers dedicated to learning, exchanging ideas, and solving problems - together.

Find all our platform links ⬇️ and follow our Community Evangelists! 👋

Your Community Evangelists:
Рекомендации по теме
Комментарии
Автор

in 4 years you have not at all changed visually, love the content quality

iyvjbcuuhggvbjg
Автор

Just thinking about the last part of the video, where you mentioned that "LIMIT" could be used to curtail the attack so that not all data is leaked.
Just wondering if the attacker could just comment out the latter part of the query, and then "LIMIT" becomes useless.

raghav
Автор

Thanks for the Video, I incorporated the solution in one of my project, great job

ramanjiv
Автор

Another great video although it is not clear why XSS has been combined in this category and the video does not discuss it.

EasyPickens
Автор

please upload another video for Insecure Design 2021

AHMADHASAN-kozt