SQL Injection Tutorial Step By Step
Overview
This report documents the findings for the SQL injection vulnerability in different website on internet.
INTRODUCTION
SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL Injection can fetch all important data from websites and can let attackers perform malicious activity. SQL Injection is very common with PHP and ASP applications.
ATTACK INTENT
· Determining Database Schema
· Extracting Data
· Adding or Modifying Data
· Bypassing Authentication
IMPACT OF SQL INJECTION
SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.
Read step by step tutorial for complete sql injection guide
Read step by step tutorial for complete sql injection guide
Download SQL-INJECTION.pdf
how can i study about ethical hacking
ReplyDelete