第二课 sql注入及防护

常见获取变量

$_GET  $_POST $_COOKIE $_SERVER

is_numeric(),ctype_digit() 正则表达式

mysql_real_escape_string() vs addslashes()

http://www.w3school.com.cn/php/func_mysql_real_escape_string.asp

 

http://www.cnblogs.com/Safe3/archive/2008/08/22/1274095.html

http://php.net/manual/en/info.configuration.php

get_magic_quotes_gpc的举例:

if (!get_magic_quotes_gpc()) {

$lastname = addslashes($_POST[‘lastname’]);

} else {

$lastname = $_POST[‘lastname’];

}

 

测试sql注入

http://127.0.0.1/dvwa/vulnerabilities/sqli/?id=%27+union+select+user%2Cpassword+from+users%23&Submit=Submit

课后了解

http://www.w3school.com.cn/php/index.asp

posted @ 2019-06-17 21:56  iwinbug  阅读(379)  评论(0)    收藏  举报