SlideShare a Scribd company logo
2
Most read
8
Most read
23
Most read
SHEKHAWATI INSTITUTE OF
ENGINEERING AND
TECHNOLOGY
A Project Presentation
On
SQL injection
Submitted to:-
Mrs. Suman Singh
HOD of CSE Dept.
Submitted by:-
Vikash Saini
B.Tech CSE 8th sem
CONTENTS
• What is SQL?
• What is SQL injection?
• SQL Injection Attacks on the rise
• Impact
• Tools to find SQL Injection
• How SQL injection work
• Error based SQL injection
• Uniscan
• sqlmap
What is SQL
• Structured Query language(SQL) is actually the standard
language for dealing with relational databases
• SQL programming can be effectively used to insert
,search,update,delete database records
• In fact it can do lot of things including,but not limited
to,optimizing and maintenance of database.
• SQL Example SELECT * FROM Members WHERE
Age>30
What is SQL injection
SQL injection is probably the most dangerous known web
attack.
Sometimes it could lead to remote code execution that gives
the hacker a full control
By levering SQL injecton, an attacker could bypass
authentication access ,modify and delete data within a
database
SQL Injection Attacks on the rise
impact
1. Leakage of sensitive information.
2. Reputation decline.
3. Modification of sensitive information.
4. Loss of control of db server.
5. Data loss.
6. Denial of service.
Some massive attacks
• Yahoo! Voices was hacked in July 2003,The attack acquired
453,000 user email addresses and passwords. The
perpetrators claimed to have used SQL injection to break in.
• LinkedIn.com leaked 6.5 million user credentials in June.
• the attack was accomplished with SQL injection.
Tools to find SQL Injection
• Netsparker (Web)
• Matrixay (Web)
• HP Webinspect (Web)
• IBM Rational AppScan (Web)
• Pangolin (Web)
• SQLMap (Web)
• Fuzzer (PL/SQL)
How SQL injection work
DB Server
User
Pass ‘ or 1=1--
• Attacker
Application
server
SQL Injection Attack #1
Unauthorized Access Attempt:
password = ’ or 1=1 --
SQL statement becomes:
select count(*) from users where username = ‘user’and
password = ‘’or 1=1 --
Checks if password is empty OR 1=1, which is always
Some SQL injection strings
Error based SQL injection
• In this case database simply send error messeage to the user
• Response : syntax error converting the nvarchar value
Checking of vulnerable sites
1. by using google search engine
By using Uniscan kali tool
Some popular vulunrable site
sqlmap
• Sqlmap is one of the most popular and powerful sql injection
automation tool out there.
• Given a vulnerable http request url, sqlmap can exploit the
remote database and do a lot of hacking like extracting
database names, tables, columns, all the data in the tables etc.
seminar report on Sql injection
seminar report on Sql injection
seminar report on Sql injection
seminar report on Sql injection
SQL injection Conclusion
• SQL injection is technique for exploiting applications that
use relational databases as their back end.
• Applications compose SQL statements and send to database.
• SQL injection use the fact that many of these applications
concatenate the fixed part of SQL statement with user-
supplied data that forms WHERE predicates or additional
sub-queries.
seminar report on Sql injection
THANK YOU

More Related Content

PPTX
Sql injections - with example
PPTX
SQL Injections - A Powerpoint Presentation
PPTX
Sql injection
PDF
Sql Injection - Vulnerability and Security
PDF
How to identify and prevent SQL injection
PPTX
Ppt on sql injection
PPTX
Sql injection - security testing
PPTX
Sql Injection attacks and prevention
Sql injections - with example
SQL Injections - A Powerpoint Presentation
Sql injection
Sql Injection - Vulnerability and Security
How to identify and prevent SQL injection
Ppt on sql injection
Sql injection - security testing
Sql Injection attacks and prevention

What's hot (20)

PPTX
SQL INJECTION
PPT
Sql injection
PPT
A Brief Introduction in SQL Injection
PPTX
Sql injection
PPT
SQL Injection
PPTX
SQL Injections (Part 1)
PPT
Sql injection
PPTX
SQL injection prevention techniques
PPTX
Sql injection
PPTX
SQL Injection
PPTX
SQL INJECTION
PDF
Sql injection with sqlmap
PPTX
PPTX
Xss attack
PPTX
A2 - broken authentication and session management(OWASP thailand chapter Apri...
PDF
Advanced SQL injection to operating system full control (slides)
PPT
Sql injection
PDF
ORM2Pwn: Exploiting injections in Hibernate ORM
PPTX
WTF is Penetration Testing v.2
SQL INJECTION
Sql injection
A Brief Introduction in SQL Injection
Sql injection
SQL Injection
SQL Injections (Part 1)
Sql injection
SQL injection prevention techniques
Sql injection
SQL Injection
SQL INJECTION
Sql injection with sqlmap
Xss attack
A2 - broken authentication and session management(OWASP thailand chapter Apri...
Advanced SQL injection to operating system full control (slides)
Sql injection
ORM2Pwn: Exploiting injections in Hibernate ORM
WTF is Penetration Testing v.2
Ad

Similar to seminar report on Sql injection (20)

PPTX
Sql injection
PPTX
cgbhjjjjjjjnmmmkmmmmmmkkkkkkTutorial5.pptx
PDF
Sql injection (sqlsentinel)(1)
PPTX
SQL Injection Stegnography in Pen Testing
PDF
Sql injection
PPTX
Cyber crime an eye opener 144 te 2 t-7
PDF
IRJET- Detection of SQL Injection using Machine Learning : A Survey
PPTX
Sql injection
PPTX
SQL Injection Introduction and Prevention
PPTX
Sql injections
PDF
Practical Approach towards SQLi ppt
PPTX
Sql Injection
PDF
Sql injection bypassing hand book blackrose
PPTX
cybersecurity and sql injection for students
PPTX
Google Dorks and SQL Injection
PPTX
Sql Injection
PPTX
SQL injection implementation and prevention
PPTX
Sql injection
PPTX
SQL INJECTIONS.pptx
PPTX
Intro to SQL Injection
Sql injection
cgbhjjjjjjjnmmmkmmmmmmkkkkkkTutorial5.pptx
Sql injection (sqlsentinel)(1)
SQL Injection Stegnography in Pen Testing
Sql injection
Cyber crime an eye opener 144 te 2 t-7
IRJET- Detection of SQL Injection using Machine Learning : A Survey
Sql injection
SQL Injection Introduction and Prevention
Sql injections
Practical Approach towards SQLi ppt
Sql Injection
Sql injection bypassing hand book blackrose
cybersecurity and sql injection for students
Google Dorks and SQL Injection
Sql Injection
SQL injection implementation and prevention
Sql injection
SQL INJECTIONS.pptx
Intro to SQL Injection
Ad

More from Jawhar Ali (20)

PPTX
seminar report on What is ransomware
PPTX
seminar report on kingapp application
PPTX
seminar report on school management system
PPTX
seminar presentation on apache-spark
PPTX
seminar presentation on Face ricognition technology
PPTX
seminar presentation on Digital Jwellery
PPTX
powerpoint presentation on sixth sense Technology
PPT
Powerpoint presentation on 5G wireless technology
PPTX
powerpoint presentation on Google glass
PDF
Table Of Contents Google Glass
PDF
introduction and abstract on Google Glass Major report
PDF
Candidate declaration on Google Glass
PDF
front Page on Google Glass
PDF
Table of contents on blood bank management system
PDF
List of figures in Blood bank management system
PDF
Full report on blood bank management system
PDF
Cand declaration
PDF
Training report on web developing
PDF
seminar report on wireless Sensor network
PPT
Cloud computing ppt
seminar report on What is ransomware
seminar report on kingapp application
seminar report on school management system
seminar presentation on apache-spark
seminar presentation on Face ricognition technology
seminar presentation on Digital Jwellery
powerpoint presentation on sixth sense Technology
Powerpoint presentation on 5G wireless technology
powerpoint presentation on Google glass
Table Of Contents Google Glass
introduction and abstract on Google Glass Major report
Candidate declaration on Google Glass
front Page on Google Glass
Table of contents on blood bank management system
List of figures in Blood bank management system
Full report on blood bank management system
Cand declaration
Training report on web developing
seminar report on wireless Sensor network
Cloud computing ppt

Recently uploaded (20)

PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Lesson notes of climatology university.
PPTX
Cell Structure & Organelles in detailed.
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
RMMM.pdf make it easy to upload and study
PPTX
Pharma ospi slides which help in ospi learning
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Classroom Observation Tools for Teachers
PPTX
Institutional Correction lecture only . . .
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Abdominal Access Techniques with Prof. Dr. R K Mishra
Sports Quiz easy sports quiz sports quiz
Module 4: Burden of Disease Tutorial Slides S2 2025
Lesson notes of climatology university.
Cell Structure & Organelles in detailed.
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
RMMM.pdf make it easy to upload and study
Pharma ospi slides which help in ospi learning
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
TR - Agricultural Crops Production NC III.pdf
Anesthesia in Laparoscopic Surgery in India
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
O5-L3 Freight Transport Ops (International) V1.pdf
O7-L3 Supply Chain Operations - ICLT Program
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Complications of Minimal Access Surgery at WLH
GDM (1) (1).pptx small presentation for students
Classroom Observation Tools for Teachers
Institutional Correction lecture only . . .
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

seminar report on Sql injection

  • 1. SHEKHAWATI INSTITUTE OF ENGINEERING AND TECHNOLOGY A Project Presentation On SQL injection Submitted to:- Mrs. Suman Singh HOD of CSE Dept. Submitted by:- Vikash Saini B.Tech CSE 8th sem
  • 2. CONTENTS • What is SQL? • What is SQL injection? • SQL Injection Attacks on the rise • Impact • Tools to find SQL Injection • How SQL injection work • Error based SQL injection • Uniscan • sqlmap
  • 3. What is SQL • Structured Query language(SQL) is actually the standard language for dealing with relational databases • SQL programming can be effectively used to insert ,search,update,delete database records • In fact it can do lot of things including,but not limited to,optimizing and maintenance of database. • SQL Example SELECT * FROM Members WHERE Age>30
  • 4. What is SQL injection SQL injection is probably the most dangerous known web attack. Sometimes it could lead to remote code execution that gives the hacker a full control By levering SQL injecton, an attacker could bypass authentication access ,modify and delete data within a database
  • 5. SQL Injection Attacks on the rise
  • 6. impact 1. Leakage of sensitive information. 2. Reputation decline. 3. Modification of sensitive information. 4. Loss of control of db server. 5. Data loss. 6. Denial of service.
  • 7. Some massive attacks • Yahoo! Voices was hacked in July 2003,The attack acquired 453,000 user email addresses and passwords. The perpetrators claimed to have used SQL injection to break in. • LinkedIn.com leaked 6.5 million user credentials in June. • the attack was accomplished with SQL injection.
  • 8. Tools to find SQL Injection • Netsparker (Web) • Matrixay (Web) • HP Webinspect (Web) • IBM Rational AppScan (Web) • Pangolin (Web) • SQLMap (Web) • Fuzzer (PL/SQL)
  • 9. How SQL injection work DB Server User Pass ‘ or 1=1-- • Attacker Application server
  • 10. SQL Injection Attack #1 Unauthorized Access Attempt: password = ’ or 1=1 -- SQL statement becomes: select count(*) from users where username = ‘user’and password = ‘’or 1=1 -- Checks if password is empty OR 1=1, which is always
  • 12. Error based SQL injection • In this case database simply send error messeage to the user • Response : syntax error converting the nvarchar value
  • 13. Checking of vulnerable sites 1. by using google search engine
  • 14. By using Uniscan kali tool
  • 16. sqlmap • Sqlmap is one of the most popular and powerful sql injection automation tool out there. • Given a vulnerable http request url, sqlmap can exploit the remote database and do a lot of hacking like extracting database names, tables, columns, all the data in the tables etc.
  • 21. SQL injection Conclusion • SQL injection is technique for exploiting applications that use relational databases as their back end. • Applications compose SQL statements and send to database. • SQL injection use the fact that many of these applications concatenate the fixed part of SQL statement with user- supplied data that forms WHERE predicates or additional sub-queries.