SQL Injection
Many web applications take user input from a form so the user input is used literally in the construction of a SQL query submitted to a database. For example SELECT productdata FROM table WHERE productname = ‘user input product name’ so SQL injection attack involves placing SQL statements in the user input the SQL injection is the type of attack to get login acces from the any website without having password and user name the sql is a special-purpose programming language designed for managing data held in a relational database management systems (RDBMS) we can modifiy these data using sql injection we can also modifiy insert, query, update and delete, schema creation and modification, and data access control
Other injection possibilities
Using SQL injections, attackers can:
- Add new data to the database
- Modify data currently in the database
- Perform an UPDATE in the injected SQL
- Often can gain access to other user’s system capabilities by obtaining their password
Comments
Post a Comment