Skip to main content

SQL Injection

SQL injection is a high-severity vulnerabiliry. Attackers can exploit SQLi vulnerabilities to access or delete data form the database and do other desirable things.

What is SQL injection?

A SQL query is one way an application talks to the database.
SQL injection occurs when an application fails to sanitize untrusted data(such as data in web form fields) in a database query.
An attacker can use specially-crafed SQL commands to trick the application into asking the database to execute unexpected command.

One-third of web applications i.e 32% of web applications have at least one SQL injection vulnerability, according to state of Software Security Report.

Attackers can Exploit SQL injection vulnerabilities to:
  • Control an application's data-driven behaviour.
  • Alter data in the database without authorization.
  • Access data withour authorization.

Anotomy of a SQL injection attack

 A SQL query includes an argument, which tell the database to return only the desired records. The value for that argument can be provided by a user(in a form field, URL parameter, web cookie, etc.)

The Risk:Data Leakage

 Some very large and devastating data  breaches have been the result of SQL injection attacks. Here are a few recent examples and their consequences.

Sample SQL injection:Breaking the Bank 

The following hypothetical example shows how a SQL injection vulnerability could be exploited by an attacker to access all bank account numbers and balances from a database.
WARNING: These tutorials are only examples and educational purposes. If anyone miss uses we are not responsible for anything that happens. Don't miss uses the knowledge.

Preventing SQL injection attacks

SQL injection is a common but avoidable vulnerability. Developers can follow these practices to avoid SQLi vulnerabilities and limit the damage they can cause.


Also Read,

Comments

Popular posts from this blog

Top 10 Free Web Hosting Provider 2019

The Dark Web

What is Wireshark?