Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
14 views

SQL Injection

Uploaded by

hackerjani677
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

SQL Injection

Uploaded by

hackerjani677
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

>> SQL INJECTION

Presenters:
>>Salman Mallah: 22BSCYS021
>>Kinza: 22BSCYS031

>> 25/03/2024
TABLE OF CONTENTS

01 What is SQL?

02 When SQL Injection started?

03 How web page works?

04 How SQL injection attack Work

05 Real Attack Demonstration!


WHAT ?
• SQL Injection (SQLi) is the most
common attack vector accounting for
over 50% of all web application
attacks nowadays.
WHAT ?
• SQL Injection (SQLi) is the most
common attack vector accounting for
over 50% of all web application
attacks nowadays.
• It is a web security vulnerability
that exploits insecure SQL code.
Using that, an attacker can
interfere with the queries an
application makes to its database.
WHAT ?
• SQL Injection (SQLi) is the most
common attack vector accounting for
over 50% of all web application
attacks nowadays.
• It is a web security vulnerability
that exploits insecure SQL code.
Using that, an attacker can
interfere with the queries an
application makes to its database.
• But it is not just "popular"; its
consequences are also nasty!
WHAT ?
• SQL Injection (SQLi) is the most
common attack vector accounting for
over 50% of all web application
attacks nowadays.
• It is a web security vulnerability
that exploits insecure SQL code.
Using that, an attacker can
interfere with the queries an
application makes to its database.
• But it is not just "popular"; its
consequences are also nasty!
• A successful SQL injection
attack can lead to
unauthorized access to
sensitive data. Such as
passwords, credit card
details, or personal user
information.
Impact of a Successful SQL Injection
Attack
•Stolen credentials—attackers can obtain credentials via SQLi and then
impersonate users and use their privileges.
•Unauthorized access to databases—attackers can gain access to the
sensitive data in database servers.
•Data alteration—attackers can alter or add new data to the accessed
database.
•Data deletion—attackers can delete database records or drop entire
tables.
Distribution of web application critical vulnerabilities
WHAT ? worldwide as of 2023
Registered attack in percentage
SQL injection
23.40%
Cross-site Scripting (store)

malicios file upload

authorisation issue

php multiple vuln

log4shell

spring4shell

weak password policy

Database Console exposure

file path traversal

0.00% 5.00% 10.00% 15.00% 20.00% 25.00%

-SOURCE
When ?
• SQLi was documented in 1998 by Jeff Forristal
• Jeff has been recognized as an industry expert in
web application security and was responsible for
the first publicized responsible security disclosure
policy (2000), the first publicized recognition of
SQL injection (Phrack, 1998)

-SOURCE
Famous attacks?
TJX Companies Attack
• Date: 2005-2007
• Loss: Over 45 million credit and debit
card numbers stolen, one of the largest
data breaches in history.

Heartland Payment Systems Attack


• Date: 2008-2009
• Loss: Over 130 million credit and
debit card numbers compromised,
one of the largest data breaches
ever reported.
Sony Pictures Entertainment Attack
• Date: 2014
• Loss: Sensitive data including employee information,
unreleased films, and internal emails stolen, causing
significant damage to Sony's reputation and financial losses.
Famous attacks?

Sony PlayStation Network Attack


1. Date: 2011
2. Loss: Personal information from over 77 million accounts
stolen, leading to a lengthy shutdown of the network and
significant financial losses for Sony.
HOW web page works? URL generated by login form

https://www.form.muet.com/?
userName=Salman&password=admin

Web server will


send SQL query
based on form
data TO SQL
SERVER
HOW web page works? URL generated by login form

https://www.form.muet.com/?
userName=Salman&password=admin

Now SQL server


read the query
and return the
matching result
back to web
server.
HOW web page works? URL generated by login form

https://www.form.muet.com/?
userName=Salman&password=admin
HOW web page works?

Web server sends back


data to web client

Web client
HOW web page works?

Web server sends back


data to web client

Web client
HOW SQLi works?
HOW SQLi works?

” OR 1=1 --
HOW SQLi works?

https://www.form.muet.com/?Name=salman&pass=” OR 1=1 --

” OR 1=1 --
HOW SQLi works?

https://www.form.muet.com/?Name=salman&pass=” OR 1=1 --

SELECT * FROM users WHERE Name='salman' AND pass='' OR 1=1 --'


HOW SQLi works?

Web server will


authenticate the
hacker as admin
of the Website
HOW SQLi works?

Web server will


authenticate the
hacker as admin
of the Website

LOL, I am now the owner of


your website.
Thanks.

You might also like