SQL Injection
SQL Injection
submitted by
Sourav Dan
( )
CST Department
of
Bishnupur Public Institute of
Engineering
at
This is to certify that Sourav Dan has completed the project titled "SQL
Injection Exploitation" under my supervision during the period from
“18.11.24” to “21.11.24” which is in partial fulfillment of requirements for
the award of the Diploma in Computer Science and Technology
degree and submitted to the Department of “CST” of “Bishnupur Public
Institute of Engineering”.
Signature of the
Supervisor Date: /
BONAFIDE CERTIFICATE
Certified that this project work was carried out under my supervision
SIGNATURE
Name : Shashwat Dey
PROJECT MENTOR
4
ACKNOWLEDGEMENT
We take this opportunity to express our deep gratitude towards our project
mentor, Mr. Shashwat Dey for giving such valuable suggestions,
guidance and encouragement during the development of this project work.
Last but not the least we are grateful to all the faculty members of Ardent
Computech Pvt. Ltd. for their support
5
CONTENT
What is cybersecurity?
Why is cybersecurity
important in todays world?
What is SQL Injection in cyber security?
What Are the
Types of SQL
Injection?
Why Is SQL Injection dangerous
in Cyber Security?
Website: testphp.vulnweb.com
Objective
Task
Future Scope
Conclusion
Bibliography
6
What is Cybersecurity?
manipulation.
and individuals.
stakeholders.
9
practices.
10
SQL Injection
testphp.vulnweb.com
“testphp.vulnweb.com” is a deliberately vulnerable website
created by Acunetix for security testing and learning purposes. It
allows cybersecurity professionals, students, and researchers to
practice ethical hacking techniques like SQL Injection, XSS, and
others in a controlled environment.
Objective:-
To understand how SQL Injection works and how attackers hack
database in real life.
Task:
From this phase, we found one Boolean based, one time based
and one UNION based SQL Injection.
We also found two database named- acuart and information_schema
After that we go through the acuart database and find out the tables
and columns .
We found 8 tables in the database and after that we fetch the data
from the “users” table.
It works.
We successfully stole the credentials using SQL Injection Attack.
And that’s how attackers or hackers hack website databases and
sell the data.
17
Future Scope
technologies grow.
increase impact.
maintenance.
18
Conclusion
SQL Injection attacks remain one of the most critical cybersecurity threats,
capable of compromising sensitive data, disrupting systems, and causing
significant financial and reputational damage. Despite their long history, SQLi
attacks continue to exploit vulnerabilities in poorly secured applications,
highlighting the need for robust defensive strategies. By implementing secure
coding practices, regular vulnerability assessments, and modern security
tools, organizations can significantly reduce the risk and impact of these
attacks. Proactive measures and continuous awareness are essential to stay
ahead in the ever-evolving landscape of cybersecurity.
19
Bibliography
testphp.vulnweb.com
chatgpt.com
Github
Geeks for geeks
Portswigger
Acunetix