wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SQL Injection

profile
Ronak Gala
Aug 27, 2022
0 Likes
0 Discussions
113 Reads

SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior.

In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack.

What is the impact of a successful SQL injection attack?

A successful SQL injection attack can result in unauthorized access to sensitive data, such as passwords, credit card details, or personal user information. Many high-profile data breaches in recent years have been the result of SQL injection attacks, leading to reputational damage and regulatory fines. In some cases, an attacker can obtain a persistent backdoor into an organization's systems, leading to a long-term compromise that can go unnoticed for an extended period.

SQL injection examples

There are a wide variety of SQL injection vulnerabilities, attacks, and techniques, which arise in different situations. Some common SQL injection examples include:

  • Retrieving hidden data, where you can modify an SQL query to return additional results.
  • Subverting application logic, where you can change a query to interfere with the application's logic.
  • UNION attacks, where you can retrieve data from different database tables.
  • Examining the database, where you can extract information about the version and structure of the database.
  • Blind SQL injection, where the results of a query you control are not returned in the application's responses.

Comments ()


Sign in

Read Next

Spotify

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Travel: Everything Everywhere!

Blog banner

Microsoft Word

Blog banner

My Favorite Country

Blog banner

How Cyber Forensics use in AI

Blog banner

Virtual Memory

Blog banner

ahh wait a min

Blog banner

1.1 basic elements

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Risk mitigation and management

Blog banner

Article on IT development trends

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Memory

Blog banner

Virtual Memory

Blog banner

Data Structures

Blog banner

John Titor: The Time Traveler

Blog banner

Virtual memory

Blog banner

Data Warehouse Bus Matrix

Blog banner

AI and Cyber Security

Blog banner

Service Operation

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Hosting basics

Blog banner

Atlantis - The Lost Island.........

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Mail merge

Blog banner

City of Mumbai (Bombay):

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

File management

Blog banner

Risk factors in service transistion

Blog banner

Outlook.com

Blog banner

LIFEHACKER

Blog banner

Memory Partitioning

Blog banner

Memory input output management

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Save Girl Child

Blog banner

Data Warehousing

Blog banner