Hacking

SQL Injection
Vulnerable:

A web application is vulnerable to SQL injection to only one reason – end user string is not properly validated and is passed to a dynamic SQL statement. The string input is usually passed directly to SQL statement. However, the user input may be stored in the database and later passed to a dynamic SQL statement. Because of the stateless nature of many web applications, it is common to write data to the database between web pages. This indirect type of attack is much more complex and requires in-depth knowledge of the application.

Non Vulnerable:
SQL Statements using bind variables are generally immune to SQL Injection attacks as the Oracle database will use the value of the bind variable exclusively and not interpret the contents of the variable in any way. PL/SQL and JDBC allow for bind variables. Bind variables should be extensively used for both security and performance reasons.
SQL injection is technique or a way to gain unauthorized access to a database via different queries. SQL injection is technique or a way to gain unauthorized access to a database via different queries. SQL injection attacks are simple in nature; an attacker passes string input to an application in hopes manipulating the SQL statements to his or her advantages. The complexity of the attack involves exploiting SQL statements that may be unknown to the attackers. Open source applications and commercial applications delivered with source code and more vulnerable since an attack can find potentially vulnerable statements prior to attack..
Wikipedia says SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when the user input is either incorrectly filtered for string 
literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever a programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.

Following is the method along with detailed introduction in images through which you can break into website that is vulnerable.















Full presentation is available at link given below





Follow me on Academia.edu

Comments