Injections
User input is always dangerous! Malicious actors will attempt to find and exploit any possible vulnerabilities your code.
In this course we will look at two different types of user inputs that lead to undesired program execution:
- Abusing unsanitized SQL statements to leak information or bypass authentication.
- Causing remote code execution in websites that rely on templates to generate content.