0% found this document useful (0 votes)
5 views

SQL

SQL Injection is a web application vulnerability that allows attackers to inject malicious SQL queries to bypass authentication or access databases. Attackers identify vulnerable parameters in web applications that accept user input via GET or POST methods. The impact of SQL injection can include unauthorized access to user accounts and exposure of database information.

Uploaded by

safili4757
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

SQL

SQL Injection is a web application vulnerability that allows attackers to inject malicious SQL queries to bypass authentication or access databases. Attackers identify vulnerable parameters in web applications that accept user input via GET or POST methods. The impact of SQL injection can include unauthorized access to user accounts and exposure of database information.

Uploaded by

safili4757
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

SQL Injection

Structure Query Language which is used for database management & it is also used to
authenticate user at the time of login.

" "
' '
'( )'
"( )"

//
--
#

What is SQL Injection Attack?

SQL Injection Attack is a web application vulnerability where an attacker tries to


inject their malicious SQL Query/Statement to execute/process their own sql
staement to bypass the login authentication or to hack the database.

How to hunt for SQL Injection Vulnerability ?

To find out sql injection vulnerability in any web application, the attacker try to
find out a vulnerable parameter (Parameter is a field which take input from the
user and send that input to web application) & inject their malicious sql staement
in that parameter in a way that it'll execute on server.
Parameter take user input and send that input value to the webserver by using 2
methods, GET & POST.

If parameter use GET method then input value will be show on URL
If Parameter use POST method then it'll not show on URL

Impact of SQL Injection Attack:

# To Bypass Login Authentication

# To Know about the DATABASE

Bypass Login Authentication:

Authenticate user when password (input) is equal to password (Stored in database)


is true.

12345 (Input) = 123456 (Stored) False

asdf123 (Input) = asdf123 (Stored) True

By Default SQL have some true statement like 1=1, 0=0, x=x, =.

username: '123'or'1'='1 '


password: 456
uname='123'or'1'='1'&pass='456'

Google Search (Google Dork) to find Admin Login Pages:

inurl:admin/login.php/asp/aspx
inurl:adminlogin.php/asp/aspx
intitle:admin inurl:login
inurl:user/login.php/asp/aspx

You might also like