0% found this document useful (0 votes)
9 views8 pages

SQL Injection

Structured Query Language (SQL) is a standardized programming language used to manage relational databases and perform operations on their data. A SQL injection attack occurs when a hacker inserts malicious SQL code via client input to access sensitive database information or modify database data without authorization. Proper user input validation is needed to prevent SQL injection and protect database security.

Uploaded by

Saleh Hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views8 pages

SQL Injection

Structured Query Language (SQL) is a standardized programming language used to manage relational databases and perform operations on their data. A SQL injection attack occurs when a hacker inserts malicious SQL code via client input to access sensitive database information or modify database data without authorization. Proper user input validation is needed to prevent SQL injection and protect database security.

Uploaded by

Saleh Hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Open

INFORMATION
SECURITY
Fundamentals
Open

SQL

Structured Query Language (SQL) is a standardized


programming language that is used to manage
relational databases and perform various operations
on the data in them.

source: https://www.navicat.com/en/products/navicat-for-sqlserver
Open

SQL

Structured Query Language (SQL) is a standardized


programming language that is used to manage
relational databases and perform various operations
on the data in them.

source: https://www.navicat.com/en/products/navicat-for-sqlserver
Open
Open

SQL INJECTION

A SQL injection attack consists of insertion or


“injection” of a SQL query via the input data from the
client to the application.

A successful SQL injection exploit can read sensitive data from the
database, modify database data (Insert/Update/Delete), execute
administration operations on the database…
Open

SQL INJECTION

username_x SELECT *
FROM users
WHERE username = ‘username_x’
password_x AND password = ‘password_x’
Open

SQL INJECTION

‘ OR ‘1’=‘1 SELECT *
FROM users
WHERE username = ‘’ OR ‘1’=‘1’
123 AND password = 123
Open

INFORMATION
SECURITY
Fundamentals

You might also like