SlideShare a Scribd company logo
Sayed Ahmad Naweed
of 30,000 websites
tested by WhiteHat
Sentinel had at least
one serious
vulnerability.
86%
Source: https://www.whitehatsec.com/statistics-report/featured/2015/05/21/statsreport.html
of these vulnerabilities
were resolved.
61%
Source: https://www.whitehatsec.com/statistics-report/featured/2015/05/21/statsreport.html
193 Days
From a single injection we
accessed EVERYTHING
Why do you put such faith
in a company that allows
itself to become open to
these simple attacks?
“
”
“
”
LulzSec
Source: http://www.theguardian.com/technology/2012/aug/29/lulzsec-hacker-arrest-sony-attack
SQL is used to communicate
with a relational database.
SQL
When an attacker attempts to
change the logic, semantics or
syntax of a legitimate SQL
statement by inserting new
SQL keywords or operators into
the statement.
Source: Halfond, William GJ, and Alessandro Orso. "AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks." Proceedings of the
20th IEEE/ACM international Conference on Automated software engineering. ACM, 2005.
SQL Injection
SQL Injection
SQL Injection
SQL
Example
#1
SELECT * FROM USERS
WHERE
Username = “sayed”
SELECT * FROM USERS
WHERE
Username = “sayed”“
SELECT * FROM USERS
WHERE
Username = “sayed”; Drop All
DATABASES
;DROP ALL DATABASES;
Example
#2
OR ‘1’ = ‘1’
SELECT * FROM USERS
WHERE
username = “sayed”
AND
Password =“1234” or ‘1’ = ‘1’
Live Demo
http://sqlzoo.net/hack/
Prevention Techniques
Scape
Characters
mysql_real_escape_string(Query)
Prepared
Stetement
SELECT * FROM USERS
WHERE
username = ?
Conclusion
• Your vulnerable if you do not use prepared
statement.
• Don’t forget
As hacks go, there are worst ones!
any question …

More Related Content

PPTX
SQL Injection
PPTX
Sql injection - security testing
PPT
A Brief Introduction in SQL Injection
PPTX
Sql injections - with example
PDF
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
PPTX
SQL INJECTION
PPT
Sql injection attack
PPTX
SQL injection prevention techniques
SQL Injection
Sql injection - security testing
A Brief Introduction in SQL Injection
Sql injections - with example
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
SQL INJECTION
Sql injection attack
SQL injection prevention techniques

What's hot (20)

PPTX
Sql Injection attacks and prevention
PPT
SQL Injection
PPTX
SQL injection
PDF
Sql Injection - Vulnerability and Security
PDF
How to identify and prevent SQL injection
PPTX
Ppt on sql injection
PPTX
Waf bypassing Techniques
PPTX
SQL Injections (Part 1)
PPTX
Sql injection
PDF
SQL Injection: complete walkthrough (not only) for PHP developers
PPTX
Sql injection
PPT
Sql injection
PPT
Sql injection
PPTX
Sql injection
PPT
Sql injection
PDF
Broken access controls
PPTX
Advanced OSSEC Training: Integration Strategies for Open Source Security
PPTX
Sql injection
PPTX
Owasp Top 10 A1: Injection
Sql Injection attacks and prevention
SQL Injection
SQL injection
Sql Injection - Vulnerability and Security
How to identify and prevent SQL injection
Ppt on sql injection
Waf bypassing Techniques
SQL Injections (Part 1)
Sql injection
SQL Injection: complete walkthrough (not only) for PHP developers
Sql injection
Sql injection
Sql injection
Sql injection
Sql injection
Broken access controls
Advanced OSSEC Training: Integration Strategies for Open Source Security
Sql injection
Owasp Top 10 A1: Injection
Ad

Similar to SQL Injection (20)

PPTX
XSS- an application security vulnerability
PDF
OWASP Top 10
PPTX
.NET Security Topics
PPTX
Secure Software Engineering
PDF
QAing the security way!
PPTX
Securing Industrial Control Systems
PPTX
vodQA(Pune) 2018 - QAing the security way
PDF
C01461422
PPTX
Appsec2013 assurance tagging-robert martin
PDF
Application Security Guide for Beginners
PPTX
IPS Best Practices
PDF
OWASP Top 10 Project
PDF
WhiteHat Security Website Statistics [Full Report] (2013)
PDF
The International Journal of Engineering and Science (The IJES)
PDF
Ijcet 06 10_005
PDF
WhiteHat Security "Website Security Statistics Report" FULL (Q1'09)
PDF
Devoid Web Application From SQL Injection Attack
PDF
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
PPTX
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
PDF
Secure coding presentation Oct 3 2020
XSS- an application security vulnerability
OWASP Top 10
.NET Security Topics
Secure Software Engineering
QAing the security way!
Securing Industrial Control Systems
vodQA(Pune) 2018 - QAing the security way
C01461422
Appsec2013 assurance tagging-robert martin
Application Security Guide for Beginners
IPS Best Practices
OWASP Top 10 Project
WhiteHat Security Website Statistics [Full Report] (2013)
The International Journal of Engineering and Science (The IJES)
Ijcet 06 10_005
WhiteHat Security "Website Security Statistics Report" FULL (Q1'09)
Devoid Web Application From SQL Injection Attack
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Secure coding presentation Oct 3 2020
Ad

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Electronic commerce courselecture one. Pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Understanding_Digital_Forensics_Presentation.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectral efficient network and resource selection model in 5G networks
Mobile App Security Testing_ A Comprehensive Guide.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
Electronic commerce courselecture one. Pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Understanding_Digital_Forensics_Presentation.pptx
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I

SQL Injection