CrazyEngineers
  • SQL Injection

    Updated: Oct 22, 2024
    Views: 1.0K
    Many web developers are unaware of how SQL queries can be tampered with, and assume that an SQL query is a trusted command. It means that SQL queries are able to circumvent access controls, thereby bypassing standard authentication and authorization checks, and sometimes SQL queries even may allow access to host operating system level commands.

    Direct SQL Command Injection is a technique where an attacker creates or alters existing SQL commands to expose hidden data, or to override valuable ones, or even to execute dangerous system level commands on the database host. This is accomplished by the application taking user input and combining it with static parameters to build an SQL query. The following examples are based on true stories, unfortunately.

    Owing to the lack of input validation and connecting to the database on behalf of a superuser or the one who can create users, the attacker may create a superuser in your database.

    More info: <a href="https://www.php.net/manual/en/security.database.sql-injection.php" target="_blank" rel="nofollow noopener noreferrer">PHP: SQL Injection - Manual</a>
    Better Article: #-Link-Snipped-#
    0
    Replies
Howdy guest!
Dear guest, you must be logged-in to participate on CrazyEngineers. We would love to have you as a member of our community. Consider creating an account or login.
Replies
  • slashfear

    MemberMar 7, 2011

    Hey buddy!!


    Check out my video which illustrates the power of sql injection (done it when I free.....) : #-Link-Snipped-#


    -Arvind
    Are you sure? This action cannot be undone.
    Cancel
  • PraveenKumar Purushothaman

    MemberMar 7, 2011

    slashfear
    Hey buddy!!


    Check out my video which illustrates the power of sql injection (done it when I free.....) : #-Link-Snipped-#


    -Arvind
    +100 Its an awesome cool video buddy... Hats off... 😀
    Are you sure? This action cannot be undone.
    Cancel
  • slashfear

    MemberMar 8, 2011

    praveenscience
    +100 Its an awesome cool video buddy... Hats off... 😀
    Thanks Buddy!! 😁
    Are you sure? This action cannot be undone.
    Cancel
  • PraveenKumar Purushothaman

    MemberMar 8, 2011

    slashfear
    Thanks Buddy!! 😁
    Actually it deserves a lot!!! But, now-a-days, even trying harder, couldn't get any site hacked... Why so?
    Are you sure? This action cannot be undone.
    Cancel
  • slashfear

    MemberMar 8, 2011

    praveenscience
    Actually it deserves a lot!!! But, now-a-days, even trying harder, couldn't get any site hacked... Why so?
    we can still hack websites but you have to know how to find the weakness of the website and the language used for creating the website.... Ok we are not going to go deep n this topic buddy I dont wanna turn this place as hacking tutorial.... Biggie will get mad i guess 😉

    -Arvind
    Are you sure? This action cannot be undone.
    Cancel
  • PraveenKumar Purushothaman

    MemberMar 8, 2011

    slashfear
    we can still hack websites but you have to know how to find the weakness of the website and the language used for creating the website.... Ok we are not going to go deep n this topic buddy I dont wanna turn this place as hacking tutorial.... Biggie will get mad i guess 😉

    -Arvind
    He he... 😛 Yeah, oki... Lets stop it here... 😀
    Are you sure? This action cannot be undone.
    Cancel
  • Priya Vas

    MemberApr 22, 2011

    The whole content copied form #-Link-Snipped-#, stop copying
    Are you sure? This action cannot be undone.
    Cancel
  • PraveenKumar Purushothaman

    MemberApr 22, 2011

    Priya Vas
    The whole content copied form #-Link-Snipped-#, stop copying
    I seriously don't understand, if you have read the whole content fully. If yes, you would have noticed that I gave a glance from that page and asked the users to read more at #-Link-Snipped-#
    Are you sure? This action cannot be undone.
    Cancel
Home Channels Search Login Register