Application Security
During the development of your application, you will not be able to anticipate all the possible ways in which it could be compromised. However, you can always try to safeguard the application by following safe coding practices, such as the encryption of data in transit and at rest. It is a well-known fact that if we protect an application from well-known attack vectors such as SQL injection, we will be able to ward off most attacks. We will cover topics such as the use of digital certificates and hashing sensitive data to protect it from attackers.
One of the major attack vectors of a software application is the command or SQL injection, in which malicious user input can change the behavior of a command or query. This can happen with poorly constructed queries in SQL, HTTP URLs, or in OS commands.
Let's look at SQL injection and command injection in detail.
SQL Injection
If you are working on an application that needs to store data, you will most...