SlideShare a Scribd company logo
6
Most read
11
Most read
14
Most read
SQL INJECTION
SUBMITTED TO:- SUBMITTED BY :-
MR. NAVEEN KEDIA ASHISH KUMAR
FINAL YEAR I.T.
INDEX
 Ethical Hacking.
 What is SQL.
 How does SQL Injection work.
 Example of SQL Injection.
 Diagram of SQL Injection.
ETHICAL HACKING
 Independent computer security Professionals breaking
into the computer systems.
 Neither damage the target systems nor steal information.
 Evaluate target systems security and report back to
owners about the Bugs found.
ETHICAL HACKERS BUT NOT CRIMINAL
HACKERS
 Completely trustworthy.
 Strong programming and computer networking skills.
 Learn about the system and trying to find its weaknesses.
 Techniques of Criminal hackers-Detection-Prevention.
 Tester only reports findings, does not solve problems.
WHAT IS SQL?
 SQL stands for Structured Query Language
 Allows us to access a database
 ANSI and ISO standard computer language
 The most current standard is SQL99
 SQL can:
 execute queries against a database
 retrieve data from a database
 insert new records in a database
 delete records from a database
 update records in a database
WHAT IS A SQL INJECTION ATTACK?
 Many web applications take user input from a form
 Often this user input is used literally in the construction
of a SQL query submitted to a database. For example:
 SELECT productdata FROM table WHERE productname =
‘user input product name’;
 A SQL injection attack involves placing SQL statements
in the user input
HOW DOES SQL INJECTION WORK?
Common vulnerable login query
SELECT * FROM users
WHERE login = 'victor'
AND password = '123'
(If it returns something then login)
ASP/MS SQL Server login syntax
var sql = "SELECT * FROM users
WHERE login = '" + formusr +
"' AND password = '" + formpwd + "'";
INJECTING THROUGH STRINGS
formusr = ' or 1=1 – –
formpwd = anything
Final query would look like this:
SELECT * FROM users
WHERE username = ' ' or 1=1
– – AND password = 'anything'
Ppt on sql injection
SQL INJECTION CHARACTERS
 ' or "character String Indicators
 -- or # single-line commen
 /*…*/ multiple-line comment
 + addition, concatenate (or space in url)
 || (double pipe) concatenate
 % wildcard attribute indicator
ALL TABLES AND COLUMNS IN ONE QUERY
 union select 0, sysobjects.name + ': ' + syscolumns.name
+ ': ' + systypes.name, 1, 1, '1', 1, 1, 1, 1, 1 from
sysobjects, syscolumns, systypes where sysobjects.xtype
= 'U' AND sysobjects.id = syscolumns.id AND
syscolumns.xtype = systypes.xtype --
ARCHITECTURE OF SQL INJECTION
LINKS
 A lot of SQL Injection related papers
 http://www.nextgenss.com/papers.htm
 http://www.spidynamics.com/support/whitepapers/
 http://www.appsecinc.com/techdocs/whitepapers.html
 http://www.atstake.com/research/advisories
 Other resources
 http://www.owasp.org
 http://www.sqlsecurity.com
 http://www.securityfocus.com/infocus/1768
THANK YOU

More Related Content

PPTX
Sql injections - with example
PPTX
SQL INJECTION
PPT
Sql injection
PPTX
Ford Fulkerson Algorithm
PPTX
SQL Injections - A Powerpoint Presentation
PPTX
Database security
PPTX
IT Act 2000
PDF
CVE-2021-44228 Log4j (and Log4Shell) Executive Explainer by cje@bugcrowd
Sql injections - with example
SQL INJECTION
Sql injection
Ford Fulkerson Algorithm
SQL Injections - A Powerpoint Presentation
Database security
IT Act 2000
CVE-2021-44228 Log4j (and Log4Shell) Executive Explainer by cje@bugcrowd

What's hot (20)

PPTX
SQL INJECTION
PPTX
Sql injection - security testing
PPT
A Brief Introduction in SQL Injection
PPTX
Sql injection
PPT
Sql injection
PPTX
Sql Injection attacks and prevention
PPTX
SQL injection prevention techniques
PPTX
seminar report on Sql injection
PPTX
Sql injection
PPTX
Sql injection in cybersecurity
PPTX
Sql injection
PPTX
SQL Injection
PDF
Sql Injection - Vulnerability and Security
PPTX
PPT
Sql injection attack
PPTX
Sql injection attack
PPT
Sql injection
PDF
How to identify and prevent SQL injection
PPTX
Whatis SQL Injection.pptx
PPTX
SQL injection
SQL INJECTION
Sql injection - security testing
A Brief Introduction in SQL Injection
Sql injection
Sql injection
Sql Injection attacks and prevention
SQL injection prevention techniques
seminar report on Sql injection
Sql injection
Sql injection in cybersecurity
Sql injection
SQL Injection
Sql Injection - Vulnerability and Security
Sql injection attack
Sql injection attack
Sql injection
How to identify and prevent SQL injection
Whatis SQL Injection.pptx
SQL injection
Ad

Similar to Ppt on sql injection (20)

PPTX
Greensql2007
PPTX
Code injection and green sql
PPTX
Sql injection
PDF
Chapter 14 sql injection
PPSX
Web application security
PDF
Module 14 (sql injection)
PDF
Defcon 17-joseph mccray-adv-sql_injection
PPTX
Understanding and preventing sql injection attacks
PDF
Php Security - OWASP
PPTX
ASP.NET Web Security
PPTX
Sql Injection V.2
PPTX
SQL Injection attack
PPTX
03. sql and other injection module v17
PPT
SQL Injection Attacks
PDF
Sql injection
PDF
Pawel Cygal - SQL Injection and XSS - Basics (Quality Questions Conference)
PDF
Prevention of SQL Injection Attack in Web Application with Host Language
PPTX
SQL Injection in action with PHP and MySQL
PPTX
Sql injections (Basic bypass authentication)
Greensql2007
Code injection and green sql
Sql injection
Chapter 14 sql injection
Web application security
Module 14 (sql injection)
Defcon 17-joseph mccray-adv-sql_injection
Understanding and preventing sql injection attacks
Php Security - OWASP
ASP.NET Web Security
Sql Injection V.2
SQL Injection attack
03. sql and other injection module v17
SQL Injection Attacks
Sql injection
Pawel Cygal - SQL Injection and XSS - Basics (Quality Questions Conference)
Prevention of SQL Injection Attack in Web Application with Host Language
SQL Injection in action with PHP and MySQL
Sql injections (Basic bypass authentication)
Ad

Recently uploaded (20)

PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Construction Project Organization Group 2.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
737-MAX_SRG.pdf student reference guides
PDF
composite construction of structures.pdf
PPTX
Geodesy 1.pptx...............................................
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
bas. eng. economics group 4 presentation 1.pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
Construction Project Organization Group 2.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
CYBER-CRIMES AND SECURITY A guide to understanding
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
737-MAX_SRG.pdf student reference guides
composite construction of structures.pdf
Geodesy 1.pptx...............................................
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Fundamentals of safety and accident prevention -final (1).pptx
UNIT 4 Total Quality Management .pptx
Internet of Things (IOT) - A guide to understanding
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
OOP with Java - Java Introduction (Basics)
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf

Ppt on sql injection

  • 1. SQL INJECTION SUBMITTED TO:- SUBMITTED BY :- MR. NAVEEN KEDIA ASHISH KUMAR FINAL YEAR I.T.
  • 2. INDEX  Ethical Hacking.  What is SQL.  How does SQL Injection work.  Example of SQL Injection.  Diagram of SQL Injection.
  • 3. ETHICAL HACKING  Independent computer security Professionals breaking into the computer systems.  Neither damage the target systems nor steal information.  Evaluate target systems security and report back to owners about the Bugs found.
  • 4. ETHICAL HACKERS BUT NOT CRIMINAL HACKERS  Completely trustworthy.  Strong programming and computer networking skills.  Learn about the system and trying to find its weaknesses.  Techniques of Criminal hackers-Detection-Prevention.  Tester only reports findings, does not solve problems.
  • 5. WHAT IS SQL?  SQL stands for Structured Query Language  Allows us to access a database  ANSI and ISO standard computer language  The most current standard is SQL99  SQL can:  execute queries against a database  retrieve data from a database  insert new records in a database  delete records from a database  update records in a database
  • 6. WHAT IS A SQL INJECTION ATTACK?  Many web applications take user input from a form  Often this user input is used literally in the construction of a SQL query submitted to a database. For example:  SELECT productdata FROM table WHERE productname = ‘user input product name’;  A SQL injection attack involves placing SQL statements in the user input
  • 7. HOW DOES SQL INJECTION WORK? Common vulnerable login query SELECT * FROM users WHERE login = 'victor' AND password = '123' (If it returns something then login) ASP/MS SQL Server login syntax var sql = "SELECT * FROM users WHERE login = '" + formusr + "' AND password = '" + formpwd + "'";
  • 8. INJECTING THROUGH STRINGS formusr = ' or 1=1 – – formpwd = anything Final query would look like this: SELECT * FROM users WHERE username = ' ' or 1=1 – – AND password = 'anything'
  • 10. SQL INJECTION CHARACTERS  ' or "character String Indicators  -- or # single-line commen  /*…*/ multiple-line comment  + addition, concatenate (or space in url)  || (double pipe) concatenate  % wildcard attribute indicator
  • 11. ALL TABLES AND COLUMNS IN ONE QUERY  union select 0, sysobjects.name + ': ' + syscolumns.name + ': ' + systypes.name, 1, 1, '1', 1, 1, 1, 1, 1 from sysobjects, syscolumns, systypes where sysobjects.xtype = 'U' AND sysobjects.id = syscolumns.id AND syscolumns.xtype = systypes.xtype --
  • 12. ARCHITECTURE OF SQL INJECTION
  • 13. LINKS  A lot of SQL Injection related papers  http://www.nextgenss.com/papers.htm  http://www.spidynamics.com/support/whitepapers/  http://www.appsecinc.com/techdocs/whitepapers.html  http://www.atstake.com/research/advisories  Other resources  http://www.owasp.org  http://www.sqlsecurity.com  http://www.securityfocus.com/infocus/1768