-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Attacking and Exploiting Modern Web Applications
By :

“In battle, there are not more than two methods of attack - the direct and the indirect; yet these two in combination give rise to an endless series of maneuvers.”
Sunzi and Giles [1]
Welcome to the fourth chapter, where we analyze SQL injections focusing on WordPress, the king of internet-facing web applications, starting from static analysis.
In the previous scenario, we looked for issues related to protocol implementations, thus studying the protocol and looking for weak implementations. This chapter will focus on source code analysis and how to use it to discover vulnerabilities.
We will rely on WordPress – which we already met in Chapter 1 – the well-known Content Management System (CMS), which has about a 43% market share of all websites at the time of writing.
The important aspect of WordPress is that it and its plugins and...