Recovering from SQL inject hack

Would love to see the code you used for filtering, I setup code that checks all querys for SELECT, INSERT, DECLARE, DELETE etc and redirects the user to their own malicious code :) but they somehow still got through.
 
Would love to see the code you used for filtering, I setup code that checks all querys for SELECT, INSERT, DECLARE, DELETE etc and redirects the user to their own malicious code :) but they somehow still got through.

there is no need to guess how, look at the logs :)
 
Back
Top