SQL Injection and Protection
#2

SQL injection attack
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.

Forms of vulnerability
Incorrectly filtered escape characters: occurs when user input is not filtered for escape characters and is then passed into an SQL statement which results in the potential manipulation of the statements performed on the database by the end user of the application.

Incorrect type handling:
It occurs when a user supplied field is not strongly typed or is not checked for type constraints.

Vulnerabilities inside the database server:
vulnerabilities that can exist within the database server software itself, would allow an attacker to perform a successful SQL injection attack based on bad Unicode characters even if the user's input is being escaped.

Blind SQL injection:
It is is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker.

Preventing SQL injection
The main defense is user input must not directly be embedded in SQL statements. user input must be carefully escaped or filtered or parameterized statements must be used.

for more details, refer:
http://en.wikipediawiki/SQL_injection
[attachment=3086]
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: sql mirroring failover, how to use regular expression to discard input string in sql injection attack, ppt on sql injection prevention, pl sql tool, sql injection seminar report in microsoft word format, sql abstract is, sql get result of,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
SQL Injection and Protection - by Sandesh K R - 06-04-2010, 12:44 PM
RE: SQL Injection and Protection - by reports-crawler - 07-04-2010, 01:10 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  ppt on protection of transmission lines using gps rashid 9 10,585 27-07-2017, 12:09 PM
Last Post: NEHA BAIJU
Thumbs Up online catering management system on php with report and source code and ppt 4 9,546 29-04-2017, 10:59 AM
Last Post: jaseela123d
  how to hack mtn network and free airtime and data 2 1,410 16-07-2016, 04:17 PM
Last Post: jaseela123d
  how to hack mtn network and free airtime and data 1 1,148 07-06-2016, 04:05 PM
Last Post: dhanabhagya
  comparison between bluetooth and wifi and gifi 1 900 31-05-2016, 12:31 PM
Last Post: dhanabhagya
  file structures and software testing vivo question and answer 1 908 28-05-2016, 10:25 AM
Last Post: dhanabhagya
Thumbs Up temperature sensor using lm35 and adc 0808 and at89c52 1 1,015 27-05-2016, 02:12 PM
Last Post: dhanabhagya
  ppt automatic vehicle accident detection and messaging system using gsm and gps modems ppt 1 957 23-05-2016, 12:21 PM
Last Post: dhanabhagya
  use daily newspaper to study and report on shares and dividend 1 1,815 19-05-2016, 12:22 PM
Last Post: dhanabhagya
Heart how to hack mtn network and free airtime and data 1 995 17-05-2016, 03:08 PM
Last Post: dhanabhagya

Forum Jump: