Gwema ukujova kwe-SQL ngobuqili obulula

I-SQL-Injection

Umjovo we-SQL ngu i-hack ekwazi ukudlala ne-database yethu ngamafomu. Ake sithi isigebengu sikhohlisa izindlela ze- amafomu ukwenza izenzo ezingalindelekile ku-database yethu. Ngale ndlela ungasusa ngokuphelele i-database yethu, unikeze amalungelo okuphatha umsebenzisi othile noma ususe ukufinyelela kuwebhusayithi yethu. Futhi, uma ikhasi lethu liyisitolo, isigebengu singakwazi ukufinyelela amakheli nama-akhawunti asebhange, into eyingozi ngempela.

Kunezindlela eziningi ezihlakaniphile zokugwema ukwesatshwa kwe-SQL Injection, kepha kunendlela eyodwa engenangqondo kuze kube manje. Lokhu kungumsebenzi omusha we-PHP khipha noma yimuphi umsebenzi okhona ku-MYSQL entanjeni yombhalo, okungukuthi, ngaphambi kokuthumela idatha yefomu kusizindalwazi, kubheka ukuthi awukho yini umsebenzi we-MYSQL kuleyo datha, okwenza lokhu umsebenzi ongenangqondo okwamanje.

Umsebenzi ozosetshenziswa ngu:

mysql_real_escape_string();

Ukuyisebenzisa, kalula faka umucu wombhalo ozohlaziywa ngaphakathi kwezinhlayiyana. Isibonelo:

$_POST['usuario']=mysql_real_escape_string($_POST['usuario']);
$_POST['nombre']=mysql_real_escape_string($_POST['nombre']);
$_POST['apellido']=mysql_real_escape_string($_POST['apellido']);
$_POST['email']=mysql_real_escape_string($_POST['email']);

Imininingwane engaphezulu | Ifomu Zebra: Umtapo wolwazi okhethekile we-PHP wamafomu


Shiya umbono wakho

Ikheli lakho le ngeke ishicilelwe. Ezidingekayo ibhalwe nge *

*

*

  1. Ubhekele imininingwane: Miguel Ángel Gatón
  2. Inhloso yedatha: Lawula Ugaxekile, ukuphathwa kwamazwana.
  3. Ukusemthethweni: Imvume yakho
  4. Ukuxhumana kwemininingwane: Imininingwane ngeke idluliselwe kubantu besithathu ngaphandle kwesibopho esisemthethweni.
  5. Isitoreji sedatha: Idatabase ebanjwe yi-Occentus Networks (EU)
  6. Amalungelo: Nganoma yisiphi isikhathi ungakhawulela, uthole futhi ususe imininingwane yakho.