SQL Injection

PraveenKumar Purushothaman

PraveenKumar Purushothaman

@praveenkumar-66Ze92 Oct 22, 2024
Many web developers are unaware of how SQL queries can be tampered with, and assume that an SQL query is a trusted command. It means that SQL queries are able to circumvent access controls, thereby bypassing standard authentication and authorization checks, and sometimes SQL queries even may allow access to host operating system level commands.

Direct SQL Command Injection is a technique where an attacker creates or alters existing SQL commands to expose hidden data, or to override valuable ones, or even to execute dangerous system level commands on the database host. This is accomplished by the application taking user input and combining it with static parameters to build an SQL query. The following examples are based on true stories, unfortunately.

Owing to the lack of input validation and connecting to the database on behalf of a superuser or the one who can create users, the attacker may create a superuser in your database.

More info: <a href="https://www.php.net/manual/en/security.database.sql-injection.php" target="_blank" rel="nofollow noopener noreferrer">PHP: SQL Injection - Manual</a>
Better Article: #-Link-Snipped-#

Replies

Welcome, guest

Join CrazyEngineers to reply, ask questions, and participate in conversations.

CrazyEngineers powered by Jatra Community Platform

  • slashfear

    slashfear

    @slashfear-tSWzpz Mar 7, 2011

    Hey buddy!!


    Check out my video which illustrates the power of sql injection (done it when I free.....) : #-Link-Snipped-#


    -Arvind
  • PraveenKumar Purushothaman

    PraveenKumar Purushothaman

    @praveenkumar-66Ze92 Mar 7, 2011

    slashfear
    Hey buddy!!


    Check out my video which illustrates the power of sql injection (done it when I free.....) : #-Link-Snipped-#


    -Arvind
    +100 Its an awesome cool video buddy... Hats off... 😀
  • slashfear

    slashfear

    @slashfear-tSWzpz Mar 8, 2011

    praveenscience
    +100 Its an awesome cool video buddy... Hats off... 😀
    Thanks Buddy!! 😁
  • PraveenKumar Purushothaman

    PraveenKumar Purushothaman

    @praveenkumar-66Ze92 Mar 8, 2011

    slashfear
    Thanks Buddy!! 😁
    Actually it deserves a lot!!! But, now-a-days, even trying harder, couldn't get any site hacked... Why so?
  • slashfear

    slashfear

    @slashfear-tSWzpz Mar 8, 2011

    praveenscience
    Actually it deserves a lot!!! But, now-a-days, even trying harder, couldn't get any site hacked... Why so?
    we can still hack websites but you have to know how to find the weakness of the website and the language used for creating the website.... Ok we are not going to go deep n this topic buddy I dont wanna turn this place as hacking tutorial.... Biggie will get mad i guess 😉

    -Arvind
  • PraveenKumar Purushothaman

    PraveenKumar Purushothaman

    @praveenkumar-66Ze92 Mar 8, 2011

    slashfear
    we can still hack websites but you have to know how to find the weakness of the website and the language used for creating the website.... Ok we are not going to go deep n this topic buddy I dont wanna turn this place as hacking tutorial.... Biggie will get mad i guess 😉

    -Arvind
    He he... 😛 Yeah, oki... Lets stop it here... 😀
  • Priya Vas

    Priya Vas

    @priya-vas-jg4p6J Apr 22, 2011

    The whole content copied form #-Link-Snipped-#, stop copying
  • PraveenKumar Purushothaman

    PraveenKumar Purushothaman

    @praveenkumar-66Ze92 Apr 22, 2011

    Priya Vas
    The whole content copied form #-Link-Snipped-#, stop copying
    I seriously don't understand, if you have read the whole content fully. If yes, you would have noticed that I gave a glance from that page and asked the users to read more at #-Link-Snipped-#