preview

Sql Injection Attacks And A Web Application Environment

Better Essays

SQL INJECTION ATTACKS

Threats in a Web Application Environment
-Sai Srikar Palukuru

Table of Contents:

1 Introduction …………………………………………………………………………… 3
2 Background ……………………………………………………………………………. 3
3 The Attack ……………………………………………………………………………... 4 3.1 Types of Attacks ……………………………………………………………………... 4
4 Second Order SQL Injection…………………………………………………………... 6 4.1 Differences between First Order and 2nd Order SQL Injection…………………….8
5 Detection of SQL injection …………………………………………………………….. 8
6 State of Art………………………………………………………………………………. 8
7 Prevention of SQL injection …………………………………………………………… 9
8 Future Trend……………………………………………………………………………. 10

INTRODUCTION:

Throughout the years the SQL Injection risk has developed so much that now significantly more obliterating assaults are seen than any time in recent history. Many Organizations are being broken by means of SQL Injection assaults that slip consistently through the system firewall and detour their web application firewalls (WAF). This gives attackers a good chance to exploit databases and internal networks of the organization. Being one of the top ten threats in OWASP, this particular threat has gained a lot of attention.

SQL injection attacks discloses delicate database data by exploiting input validation vulnerabilities in a Web webpage. Usually, Web sites validate all user inputs before sending queries to the database. If this is

Get Access