0% found this document useful (0 votes)
33 views7 pages

SQL Injection

The document discusses SQL injection, a code injection technique used to attack data-driven web applications. SQL injection works by inserting malicious SQL statements into entry fields for execution, allowing an attacker to modify or retrieve data from vulnerable databases. If not properly defended against, SQL injection can allow unauthorized users to spoof privileged identities, tamper with data, and even destroy all server data by executing unauthorized commands. The document provides an introduction to SQL injection, examples of how it works, its potential impacts, and techniques for defending against such attacks.

Uploaded by

darvinsherathiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views7 pages

SQL Injection

The document discusses SQL injection, a code injection technique used to attack data-driven web applications. SQL injection works by inserting malicious SQL statements into entry fields for execution, allowing an attacker to modify or retrieve data from vulnerable databases. If not properly defended against, SQL injection can allow unauthorized users to spoof privileged identities, tamper with data, and even destroy all server data by executing unauthorized commands. The document provides an introduction to SQL injection, examples of how it works, its potential impacts, and techniques for defending against such attacks.

Uploaded by

darvinsherathiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

SQL INJECTION

VAGHELA ARYAN ASHOKBHAI


SEAT NO : 3978 SEM : 6
CONTENT

Introduction
What Is Sql Injection
Real World Examples
How Sql Injection Works?
Impact Of Sql Injection
Types Of Attacks
Hack A Website
Defence Against Sql Injection
Other Injection Tools
Sql Injection Tools
Conclusion
 INTRODUCTION

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
• This is a method to attack web applications that have a data repository.
• The attacker would send a specially crafted SQL statement that is designed to
cause some malicious action.
 WHAT IS SQL INJECTION ?

Structured Query Language (SQL*) Injection Is A Code


Injection Technique Used To Modify Or Retrieve Data
From SQL Databases.

Inserting Specialized SQL Statements Into An Entry


Field, An Attacker Is Able To Execute Commands That
Allow For The Retrieval Of Data From The Database,
The Destruction Of Sensitive Data, Or Other
Manipulative Behaviors.
WHAT IS SQL INJECTION ?

The Proper SQL Command Execution, The Unauthorized


User Is Able To Spoof The Identity Of A More Privileged
User, Make Themselves Or Others Database Administrators,
Tamper With Existing Data, Modify Transactions And
Balances, And Retrieve Or Destroy All Server Data.

SQL Is A Programming Language Used To Maintain Most


Databases.

You might also like