)
Settings
Log out
In this session we are going to learn how sql injection works in real time websites.
Once you learn about sql injection from this session, you can go to the lab and start practicing the injection methods in that website.
SQL injection is a set of SQL commands that are placed in a URL string or in data structures in order to retrieve a response that we want from the databases that are connected with the web applications. This type of attacks generally takes place on webpages developed using PHP or ASP.NET.
An SQL injection attack can be done with the following intentions −
To dump the whole database of a system,
To modify the content of the databases, or
To perform different queries that are not allowed by the application.
This type of attack works when the applications don’t validate the inputs properly, before passing them to an SQL statement. Injections are normally placed put in address bars, search fields, or data fields.
The easiest way to detect if a web application is vulnerable to an SQL injection attack is to use the " ‘ " character in a string and see if you get any error.
Goto https://inetsecurity.net.in/adminpage/vulnerabilities/sqlinjection/index.php
complete all the tasks.