wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SQL Injection

profile
Ronak Gala
Aug 27, 2022
0 Likes
0 Discussions
113 Reads

SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior.

In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack.

What is the impact of a successful SQL injection attack?

A successful SQL injection attack can result in unauthorized access to sensitive data, such as passwords, credit card details, or personal user information. Many high-profile data breaches in recent years have been the result of SQL injection attacks, leading to reputational damage and regulatory fines. In some cases, an attacker can obtain a persistent backdoor into an organization's systems, leading to a long-term compromise that can go unnoticed for an extended period.

SQL injection examples

There are a wide variety of SQL injection vulnerabilities, attacks, and techniques, which arise in different situations. Some common SQL injection examples include:

  • Retrieving hidden data, where you can modify an SQL query to return additional results.
  • Subverting application logic, where you can change a query to interfere with the application's logic.
  • UNION attacks, where you can retrieve data from different database tables.
  • Examining the database, where you can extract information about the version and structure of the database.
  • Blind SQL injection, where the results of a query you control are not returned in the application's responses.

Comments ()


Sign in

Read Next

Boxing

Blog banner

Virtual Machine

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Hacking of web server and application

Blog banner

Child labour

Blog banner

How to Run your First android App

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Virtual Memory

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

What is E-commerce

Blog banner

Virtual Memory

Blog banner

Health is Wealth

Blog banner

Linux VServer Architecture

Blog banner

Recipe of Paneer Butter Masala

Blog banner

What your Favorite colour says about You?

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Explain Kernel in OS

Blog banner

SESSION HIJACKING

Blog banner

Retiring ISS

Blog banner

Google

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Rapido

Blog banner

Penetration Testing

Blog banner

BUFFER OVERFLOW_142

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Firewall

Blog banner

Multicore and multithreading 171

Blog banner

Intrusion Detection System

Blog banner

Uniprocessor scheduling

Blog banner

Deadlock and starvation

Blog banner

Sweet Mango Murabba

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Texting is actually better than talking in person

Blog banner

Understanding - Proof of Work!

Blog banner

Hash password! Is it really secured?

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Microsoft powerpoint presentation

Blog banner