Beefy Boxes and Bandwidth Generously Provided by pair Networks
Welcome to the Monastery
 
PerlMonks  

Re^3: Use PPI to Find SQL Injection Attacks

by jZed (Prior)
on Aug 14, 2007 at 19:08 UTC ( #632573=note: print w/replies, xml ) Need Help??


in reply to Re^2: Use PPI to Find SQL Injection Attacks
in thread Use PPI to Find SQL Injection Attacks

A minimal DBI subclass can be found here: Interpolate binds into SQL on error - DBI subclassing (possibly not the best example but since I wrote it I knew where to find it :-)). Basically you'd need to redefine execute() to do nothing, and redefine prepare() (in MyDBI::db) to do your injection checking.
  • Comment on Re^3: Use PPI to Find SQL Injection Attacks

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://632573]
help
Chatterbox?
[LanX]: yes, test passed :)
[sierpinski]: woo hoo! you can go home for the day now
[Eily]: does this mean you'll give up the random prefix solution LanX?
[LanX]: yep, sorry ;(
[Eily]: such a fine and clever workaround though...
[LanX]: well even my random fingers have memory ...
[Eily]: you could have tried randomly swapping your fingers

How do I use this? | Other CB clients
Other Users?
Others musing on the Monastery: (13)
As of 2017-03-28 13:01 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?
    Should Pluto Get Its Planethood Back?



    Results (331 votes). Check out past polls.