1 / 20

What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybersecurity Training | Edureka

(** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **)<br>This u2018SQL Injection Attacku2019 PPT by Edureka will help you learn one of the most dangerous web application vulnerability u2013 SQL Injection. <br>Below is the list of topics covered in this session:<br><br>Web Application Security <br>What is SQL Injection Attack? <br>Types of SQL Injection attacks <br>Demo u2013 SQL Injection Attack Types <br>Prevention of SQL Injection Attack<br><br>Cyber Security Playlist: https://bit.ly/2N2jlNN <br>Cyber Security Blog Series: https://bit.ly/2AuULkP <br><br>Instagram: https://www.instagram.com/edureka_lea...<br>Facebook: https://www.facebook.com/edurekaIN/ <br>Twitter: https://twitter.com/edurekain <br>LinkedIn: https://www.linkedin.com/company/edureka

EdurekaIN
Download Presentation

What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybersecurity Training | Edureka

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  2. Agenda Types of SQL Injection Attacks What is Application Security? 03 01 05 Prevention of SQL Injection attack 04 02 Demo - SQL Injection Attack types What is SQL Injection Attack? Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  3. Application Security Copyright © 2019, edureka and/or its affiliates. All rights reserved.

  4. Cybersecurity Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Application Security Network Security Information Security Operational Security Disaster Recovery End-user Education Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  5. Web Application Vulnerabilities Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Application Security 0.06% 0.19% Denial of Service XML External Entity Open Direct General Bypass Authentication Bypass Remote File Inclusion Full Path Disclosure Remote Code Execution Local File Inclusion Cross Site Request Forgery 0.63% 1.69% 2.19% 2.19% 2.44% 2.75% 4.57% 8.63% File Upload SQL Injection 9.69% 18.01% Cross Site Scripting 46.97% 0% 10% 20% 30% 40% 50% Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  6. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  7. What is SQL Injection? Copyright © 2019, edureka and/or its affiliates. All rights reserved.

  8. The need for more advanced technology and dynamic websites grew. Front End: HTML, CSS, JavaScript Back End: .NET, PHP, Ruby, Python In the early days of internet, building websites was pretty straightforward Database: MySQL, Oracle, MongoDB

  9. What is SQL Injection? A SQL query is in one way an application interacts with database An SQL Injection occurs when an application fails to sanitize the user input data An attacker can use specially crafted SQL commands to control web application’s database server Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  10. SQL Injection Attack – Non Technical Explanation Drive through <route> and <where should the bus stop?> if <when should the bus stop?>. Sample populated form Drive through route77 and stop at the bus stop if there are people at the bus stop Drive through route77 and do not stop at the bus stop and ignore the rest of the from. if there are people at the bus stop Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  11. SQL Injection Attack – Technical Explanation Sample SQL statement $statement = “SELECT * FROM users WHERE username = ‘$user’ AND password = ‘$password‘“; $statement = “SELECT * FROM users WHERE username = ‘Dean’ AND password = ‘WinchesterS’“; Sample SQL Injection Condition that will always be true, thereby it is accepted as a valid input by the application $statement = “SELECT * FROM users WHERE username = ‘Dean OR ‘1’=‘1’ --‘AND password = ‘WinchesterS’“; Instructs the SQL parser that the rest of the line is a comment and should not be executed Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  12. Impact of SQL Injection Attack Delete data and drop tables Extract sensitive information Misusing authentication details Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  13. Types of SQL Injection Copyright © 2019, edureka and/or its affiliates. All rights reserved.

  14. Categories of SQL Injection SQL Injection Out-of-bound SQLi In-Band SQLi Blind SQLi Union-based Error-based Time-based Boolean-based Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  15. Types of SQL Injection Error-based SQL Injection Union-based SQL Injection https://example.com/index.php?id=1 AND(SELECT 1 FROM(SELECT COUNT(*),concat(version(),FLOOR(rand(0)*2))x FROM information_schema.TABLES GROUP BY x)a)-- https://example.com/index.php?id=1+AND+IF(version()+LIKE+'5%',true,false) Error Based Error Based Union Based Union Based Boolean Based Boolean Based Time Based Time Based Out-of-bound Out-of-bound https://example.com/index.php?id=1 AND SELECT "mysql" UNION SELECT @@version https://example.com/index.php?id=1+AND+IF(version()+LIKE+'5%',sleep(3),false)) Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  16. Demo – Types of SQL Injection Copyright © 2019, edureka and/or its affiliates. All rights reserved.

  17. Preventing SQL Injection Performing static and dynamic testing Using parameterized queries and ORMs Using escape characters in SQL queries Enforcing least privilege on database Enabling web-application firewalls Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  18. Exploiting SQL Vulnerability in Application Copyright © 2019, edureka and/or its affiliates. All rights reserved.

  19. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

More Related