SQL Injection Attacks, Detection and Prevention
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
Sql injection is the most dangerous way in which our important and protected data can be hacked. Anybody having a little amount of knowledge can get into the database through web interfaces and can modify or delete the important or protected content of our database. The method or principle is the application takes input from user through any kind of form like for example google forms for winning prizes giving our email and passwords etc. And the malicious users can interpret the vulnerable data which will be interpreted as the sql query instead of the data. This query will take or extract the database details and will allow them to misuse data. Not only modification of database, this will let the hackers to get unauthorized access to any service which is provided like through that form. Injection attack is common of the top 5 web attacks that are executed in the world. Sql injection is a method for exploiting web applications that use client supplied data given through sql queries. Sqli is same as sql where an intruder changes the structure of the query by inserting any sql commands . Our aim is to implement various types of sql injection attacks and through the results we will tell how data can be received by modifying the query. This loss of data can cause a firm to lose a fortune. We will give the example in the below mentioned example.
Authors and Affiliations
Shreyash Shantam, Sudha S
Experimental Investigation for Thermal Conductivity Enhancement of Ethylene Glycol Based Nano Fluid Containing ZnO Nanoparticles
Experimental study of effective thermal conductivity of ZnO based Nano fluid is presented in this research. The Nano fluid was prepared by dispersing ZnO nanoparticles in ethylene glycol using a sonicator and adding sur...
Survey on Clustering Algorithms in Wireless Sensor Networks
To monitor the disaster management and industrial automation we make use of wireless sensor network. In order to achieve this sensor nodes have to be grouped together to operate and gather the aggregated information aut...
Performance Evaluation of Procedural Cognitive Complexity Metric on Imperative Programming Languages
Software metrics is an acceptable measure of software quality. An improved complexity metric named procedural cognitive complexity metric (PCCM) that consider factors affecting the complexity of a procedural programming...
Digital Image Forgery Detection Based On SVD
Due to availability of powerful photo editing software like Adobe Photoshop, 3DS Max, GIMP, Coral Paint Shop it is very simple to manipulate the digital images. As a result digital evidences have not yet been accepted i...
Application Of Plan-Do-Check-Act Cycle For Quality And Productivity Improvement - A Review
The PDCA Cycle is a systematic series of steps for gaining valuable learning and knowledge for the continual improvement of a product or process. PDCA is an iterative four-step quality improvement and productivity impro...