Gameplay

3/Gameplay/grid-small

What is sql injection?

 What Is SQL Injection?

SQL injection is a code injection technique that exploits security vulnerability in a website's software. Arbitrary data is inserted into a string of code that is eventually executed by a database. The result is that the attacker can execute arbitrary SQL queries or commands on the backend database server through the web application.In October 2011, for example, attackers planted malicious JavaScript on Microsoft's ASP.Net platform. This caused the visitor's browser to load an iframe with one of two remote sites. From there, the iframe attempted to plant malware on the visitor's PC via a number of browser drive-by exploits.Microsoft has been offering ASP.Net programmers information on how to protect against SQL injection attacks since at least 2005. However, the attack still managed to affect around 180,000 pages.Jones said that, with the number of interconnected devices on the planet set to exceed the number of humans by 2015, cybercrime and data protection need to take higher priority on the board's agenda. In order for this to happen, however, the Chief Information Security Officer (CISO) needs to assess the level of risk within their organisation, and take one step at a time."I always say, if anyone says APT [advanced persistent threat] in the room, an angel dies in heaven, because APTs are not the problem," said Jones. "I'm not saying that they're not real, but let's fix the basics first. Are organisations completely certain they're not vulnerable to SQL injections? And have they coded their web application securely?"Generally it takes between 6 and 8 months for an organisation to find out it has been breached, Jones added. However, by understanding their risk profile and taking simple proactive measures, such as threat scenario modelling, companies could prevent 87 percent of attacks.

SQL injection

What Is SQL Injection?

Structured Query Language (SQL) is basically a textual language that enables interaction with a database server. SQL commands such as INSERT, RETRIEVE, UPDATE, and DELETE are used to perform operations on the database. Programmers use these commands to manipulate data in the database server.SQL injection is defined as a technique that takes advantage of non-validated input vulnerabilities and injects SQL commands through a web application that are executed in a back-end database. Programmers use sequential SQL commands with client-supplied parameters making it easier for attackers to inject commands. Attackers can easily execute random SQL queries on the database server through a web application. Attackers use this technique to either gain unauthorized access to a database or to retrieve information directly from the database.



SQL Injection AttacksBased on the application and how it processes user-supplied data, SQL injection can be used to perform the following types of attacks:

1.Authentication bypass: Here the attacker could enter into the network withoutproviding any authentic user name or password and could gain the access over the network. He or she gets the highest privilege in the network.

2.Information disclosure: After unauthorized entry into the network, the attacker getsaccess to the sensitive data stored in the database.

3.Compromised data integrity: The attacker changes the main content of the website and also enters malicious content into it.

4.Compromised availability of data: The attacker uses this type of attack to delete the data related to audit information or any other crucial database information.

5.Remote code execution: An attacker could modify, delete, or create data or even can create new accounts with full user rights on the servers that share files and folders. It allows an attacker to compromise the host operating system.


How Web Applications Work?

A web application is a software program accessed by users over a network through a web browser. 
Web applications can be accessed only through a web browser (Internet Explorer, Mozilla Firefox, etc.). Users can access the application from any computer of a network. 
Based on web applications, web browsers also differ to some extent. Overall response time and speed is dependent on connection speed.
Step 1: The user requests through the web browser from the Internet to the web server.
Step 2: The Web Server accepts the request and forwards the request sent by the user to the applicable web application server.
Step 3: The web application server performs the requested task.
Step 4: The web applications accesses the entire database available and responds to the web server.
Step 5: The web server responds back to the user as the transaction is complete.Step 6: Finally the information that the user requested appears on the monitor of the user.


Server-side Technologies.
Server side technology

This technology is used on the server side for client/server technology. For achieving business success, not only information is important, but we also need speed and efficiency. Server-side technology helps us to smoothly access, deliver, store, and restore information.
 Various server-side technologies include: ASP, ASP.Net, Cold Fusion, JSP, PHP, Python, and Ruby on Rails. Server side technologies like ASP.NET and SQL can be easily exploited by using SQL injections.

1.Powerful server-side technologies like ASP.NET and database servers allow developers to create dynamic, data-driven websites with incredible ease.

2.All relational databases, SQL Server, Oracle, IBM DB2, and MySQL, are susceptible to SQL injection attacks.

3.SQL injection attacks do not exploit a spe8cific software vulnerability; instead they target websites that do not follow secure coding practices for accessing and manipulating data stored in a relational database.

4.The power of ASP.NET and SQL can easily be exploited by attackers using SQL injection attacks.




0 Comments:

Post a Comment