Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Database & SysAdmin
  3. Database
  4. Sql injection Attack

Sql injection Attack

Scheduled Pinned Locked Moved Database
questiondatabase
8 Posts 4 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A Offline
    A Offline
    Aatif Ali from Bangalore
    wrote on last edited by
    #1

    What is SQL injection attack...?

    L Richard DeemingR 2 Replies Last reply
    0
    • A Aatif Ali from Bangalore

      What is SQL injection attack...?

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #2

      SQL Injection Attacks and Some Tips on How to Prevent Them[^]

      Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^]

      A 1 Reply Last reply
      0
      • A Aatif Ali from Bangalore

        What is SQL injection attack...?

        Richard DeemingR Offline
        Richard DeemingR Offline
        Richard Deeming
        wrote on last edited by
        #3

        http://en.wikipedia.org/wiki/SQL_injection[^]

        SQL injection is a technique often used to attack data driven applications. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker).

        https://www.owasp.org/index.php/SQL_Injection[^]

        A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands.

        See also: http://xkcd.com/327/[^]


        "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

        "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

        A 1 Reply Last reply
        0
        • Richard DeemingR Richard Deeming

          http://en.wikipedia.org/wiki/SQL_injection[^]

          SQL injection is a technique often used to attack data driven applications. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker).

          https://www.owasp.org/index.php/SQL_Injection[^]

          A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands.

          See also: http://xkcd.com/327/[^]


          "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

          A Offline
          A Offline
          Aatif Ali from Bangalore
          wrote on last edited by
          #4

          Thanks ur Post...How to avoid or prevent this attack...?

          G Richard DeemingR 2 Replies Last reply
          0
          • L Lost User

            SQL Injection Attacks and Some Tips on How to Prevent Them[^]

            Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^]

            A Offline
            A Offline
            Aatif Ali from Bangalore
            wrote on last edited by
            #5

            Thnks..

            L 1 Reply Last reply
            0
            • A Aatif Ali from Bangalore

              Thnks..

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #6

              Don't thank me, just read the article I linked.

              Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^]

              1 Reply Last reply
              0
              • A Aatif Ali from Bangalore

                Thanks ur Post...How to avoid or prevent this attack...?

                G Offline
                G Offline
                GuyThiebaut
                wrote on last edited by
                #7

                Have a look here - Clickety[^]

                “That which can be asserted without evidence, can be dismissed without evidence.”

                ― Christopher Hitchens

                1 Reply Last reply
                0
                • A Aatif Ali from Bangalore

                  Thanks ur Post...How to avoid or prevent this attack...?

                  Richard DeemingR Offline
                  Richard DeemingR Offline
                  Richard Deeming
                  wrote on last edited by
                  #8

                  Aatif Ali from Bangalore wrote:

                  How to avoid or prevent this attack...?

                  1. Use parameterized queries;
                  2. Don't use dynamic SQL, use parameterized queries;
                  3. Oh, and did I mention: use parameterized queries!

                  Input validation and other techniques have their place, but the only way to completely avoid SQL injection is to use parameterized queries. If you ever find yourself concatenating strings (other than known constant strings) to build a query, either in client code or a stored procedure, you've left yourself open to SQL injection.


                  "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                  "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

                  1 Reply Last reply
                  0
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Don't have an account? Register

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups