)
Settings
Log out
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application.
A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system.
SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands.
Consider an application that lets users log in with a username and password. If a user submits the username joshua and the password password111, the application checks the credentials by performing the following SQL query:
SELECT * FROM users WHERE username = 'joshua' AND password = 'password111'
If the query returns the details of a user, then the login is successful. Otherwise, it is rejected.
Here, an attacker can log in as any user without a password simply by using the SQL comment sequence -- to remove the password check from the WHERE clause of the query. For example, submitting the username administrator'-- and a blank password results in the following query:
--
WHERE
administrator'--
SELECT * FROM users WHERE username = 'administrator'--' AND password = ''
This query returns the user whose username is administrator and successfully logs the attacker in as that user.
administrator
The above query eliminates everything that is after -- . you can learn more from the next sessions.
Most of the tasks in this realtime applications contains sql injection attacks. try out and find it.
https://inetsecurity.net.in/adminpage/vulnerabilities/pro/index.php