written 7.9 years ago by | modified 2.8 years ago by |
Mumbai University > Information Technology > Sem 5 > Advanced Database Management System
Marks: 10M
Year: Dec 2015
written 7.9 years ago by | modified 2.8 years ago by |
Mumbai University > Information Technology > Sem 5 > Advanced Database Management System
Marks: 10M
Year: Dec 2015
written 7.9 years ago by |
SQL injection is a type of security attack on an organization’s database. In this attack, a string is attached by the attacker to an SQL command that forwards or retrieve data from the database. This is advantageous for attacker, as she/he may get unauthorised access to database or sensitive information.
1) SQL Manipulation:- if an application directly passes login credentials database, its prone to an SQL injection attack through SQL manipulation for e.g. We can take addition of a certain condition to the WHERE CLAUSE in an SQL query. This may skip the authentication procedure, & thus may give access to all activities that user can perform.
Select * from user_db WHERE username = ‘ Adam’ & PASSWORD = ‘Adampass’. Attacker has knowledge of username only he/she may change the previous statement as follows:- Select * from users_db WHERE username = ‘adam’ and (PASSWORD= ‘Adampass’ or (‘a’= ‘a’) Authentication will be. Skipped & db access may be granted to attacker.
2) Code injection:- adding more SQL statements to an SQL statement in an attempt to obtain access rights or some sensitive information is termed as code injection. This is another type SQL injection attack take advantage of some kind of bug that appears in the computer system due to invalid data processing. Intention of changing the course of query execution can be there by adding SQL statements.
3) Function call injection: - In this attacker inserts a call. The attacker may also get permission for making system calls through function call injection.
Risk associated with SQL injection attacks are:-