Trade in your item
Get a $5.86
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

SQL Injection Attacks and Defense Paperback – May 15, 2009

ISBN-13: 978-1597494243 ISBN-10: 1597494240 Edition: 1st

8 New from $21.08 16 Used from $18.14
Rent from Amazon Price New from Used from
"Please retry"
"Please retry"
$21.08 $18.14

There is a newer edition of this item:


Shop the new
New! Introducing the, a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 474 pages
  • Publisher: Syngress; 1st edition (May 15, 2009)
  • Language: English
  • ISBN-10: 1597494240
  • ISBN-13: 978-1597494243
  • Product Dimensions: 9.2 x 7.5 x 1.2 inches
  • Shipping Weight: 2.1 pounds
  • Average Customer Review: 4.8 out of 5 stars  See all reviews (11 customer reviews)
  • Amazon Best Sellers Rank: #1,187,940 in Books (See Top 100 in Books)

Editorial Reviews


"With SQL Injection Attacks and Defense penetration testers now have a resource to fill in the gaps between all of the scattered tutorials on the Internet. Learn to recognize and take advantage of SQL injection flaws of all varieties on all platforms."--Devon Kearns, IS Security Analyst

From the Back Cover

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts.

  • What is SQL injection?-Understand what it is and how it works
  • Find, confirm, and automate SQL injection discovery
  • Discover tips and tricks for finding SQL injection within the code
  • Create exploits using SQL injection
  • Design to avoid the dangers of these attacks

More About the Author

Justin Clarke is a co-founder and Director at Gotham Digital Science, based in the United Kingdom. He has over twelve years of experience in assessing the security of networks, web applications, and wireless networks for large financial, retail, technology and government clients in the United States, the United Kingdom and New Zealand.

Justin is the the technical editor and lead author of "SQL Injection Attacks and Defense" (Syngress 2009), co-author of "Network Security Tools: Writing, Hacking, and Modifying Security Tools" (O'Reilly 2005), a contributing author to "Network Security Assessment: Know Your Network, 2nd Edition" (O'Reilly 2007), as well as a speaker at a number of conferences and events on security topics, including Black Hat USA, EuSecWest, OSCON, ISACA, RSA, SANS, OWASP, and the British Computer Society. He is the author of the open source SQLBrute blind SQL injection testing tool, and is the Chapter Leader for the London chapter of OWASP.

Customer Reviews

4.8 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See all 11 customer reviews
This book is the only book you will ever need on SQL injection.
Laurent D
Unfortunately the majority of the things I was unclear about before reading the book, I'm still unclear about because its the same material.
Chris Gates
Whether you're a professional app hacker, or just want to learn what this all means -read the book.
Rafal (Raf) Los

Most Helpful Customer Reviews

13 of 13 people found the following review helpful By Mike on May 27, 2009
Format: Paperback
I'm giving "SQL Injection Attacks and Defenses" five stars for a few reasons.

First, the book is extremely comprehensive, covering everything from basic "What is SQL Injection?" information to advanced exploit development and static analysis tools (including open source tools).

Second, this book was obviously written very recently. The content is fresh and cutting-edge.

Finally, the book is advanced. Though the reader doesn't necessarily need to know much about SQL Injection in order to start reading it, the book covers as much as anyone would need to know about the subject.

SQL Injection Attacks and Defenses is a well written, comprehensive book that can be extremely useful to security professionals, developers, and database administrators interested in writing or maintaining secure code. It could easily be called the "bible" of SQL Injection.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 8 people found the following review helpful By Richard Bejtlich on October 24, 2009
Format: Paperback
I just finished reviewing The Web Application Hacker's Handbook, calling it a "Serious candidate for Best Book Bejtlich Read
2009." SQL Injection Attacks and Defense (SIAAD) is another serious contender for BBBR09. In fact, I recommend reading TWAHH first because it is a more comprehensive overview of Web application security. Next, read SIAAD as the definitive treatise on SQL injection. Syngress does not have a good track record when it comes to books with multiple authors -- SIAAD has ten! -- but SIAAD is clearly a winner.

SIAAD is very detailed, with code samples to demonstrate the author's attack patterns. They cover multiple programming languages, multiple databases, and flood the book with examples. It's clear the authors utilize these methods for their daily work. Just about every situation is addressed, like returning database query results using DNS, HTTP, database connections, and even email. I admit I laughed when reading that chapter 7 offered "advanced topics." I thought the first 6 chapters were advanced enough, given the depth of the material!

I had no real issues with this book, but it's important to realize you won't read about attacks against PostgreSQL, for example. Other reviewers noted this as well. However, the authors do concentrate on the methodology and offensive mindset needed to attack any SQL database. I believe dedicated readers could apply the lessons of SIAAD to products beyond MS-SQL, Oracle, and MySQL.

Great work -- this is the sort of "niche book" that should be referenced by anyone else who wants to cover Web-related attacks.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 4 people found the following review helpful By Data Guy on July 24, 2009
Format: Paperback
This is a book that I can heartily endorse. My bailiwick, and probably yours too if you are looking here, is data management and database administration. And if you function within that realm, you should be familiar with SQL injection attacks and how to defend them. Not surprisingly, given its title, that is just what this book provides.

SQL injection is quite dangerous, and yet is commonly misunderstood by many. This book, which is devoted exclusively to the SQL injection threat and how to defend against it, provides the knowledge and tactics you will need to understand and combat SQL injection attacks.

From the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures, the book is a SQL injection tour de force. The book is up-to-date and covers unique, publicly unavailable information. One quick example of a a major benefit of this book: you can make the code level and platform level defenses offered in Chapters 8 and 9 can available to the developers and system administrators responsible for Internet development at your shop... which should minimize the risk of SQL injection attacks.

If you are a DBA, programmer, or system analyst involved in writing Internet applications using database systems, then you owe it to yourself to buy and read SQL Injection Attacks and Defense. It just may save your data!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By TurboBorland on April 21, 2011
Format: Paperback
Let me preface this review by saying that I have performed and understand the subject matter fairly well. I was more interested in picking up some new tricks and techniques and also taking a look at the code review section.

On the tips and ticks need, this book delivered. What I liked about this book was how the authors explained a myriad of ways to do something. For example, uploading a file to the file system. They covered privileges needed, how likely you'd run across something like this, the different ways for the most common RDMBSs, ways that may be more likely in the future, and etc. It was this kind of information that I was hoping to find in the book.

I even picked up some new techniques I haven't heard about or thought about. The section on privilege escalation was incredibly interesting. Also, have you ever heard of second-order sql injection? It's something that was a 'duh' moment of the possibilities I may have missed in the past.

There were a couple of things I, personally, did not like about this book. They sort of beat ideas into your head. This is great when you are first learning the subject. The more you hear about the subject and different wordings about the subject makes it stick into your head. However, when you know about the technique, it gets annoying to hear the same thing getting explained over and over again. This does not deviate from my overall enjoyment of the material.

I also would have to say I was disappointed in the code review section. I believe they did a good job if you are new to code review, but a short excerpt on lexical analysis and how to create regex to search for commonly abused functions was the most it was willing to venture into this category.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Most Recent Customer Reviews