A Study on SQL Injection Attacks.
Authors: Mohammed Mustafa Khan
DOI: https://doi.org/10.5281/zenodo.13959661
Short DOI: https://doi.org/g8nnrx
Country: USA
Full-text Research PDF File: View | Download
Abstract: Some web applications have inherent vulnerabilities that allow hackers to get unauthorized access to confidential and private data in an organization. SQL (structured query language) injection attacks remain to be a serious threat to web applications. It is one of the most used mechanisms by cyberattacks to steal or compromise sensitive data stored in relational databases. Some web application developers design systems with bugs or accidentally leave existing gaps by not screening the user's input for some unique symbols and characters that exist within the structural query statements or failing to validate the quality of information to find out if it is numerical or text that triggers the unprecedented outcome of its implementation. Attackers seem to have learned the existing web application's vulnerabilities correctly and seize to utilize these vulnerabilities to their advantage. SQL injection attacks comprise the insertion of a SQL command or query by using the input data from the client side that cascade to the application. It is conducted by injecting a malicious program in the SQL statement that modifies or alters the data by updating, inserting, or deleting. Additionally, superior SQL queries can initialize the administrative operations of the database, such as shutting down the database management system (DBMS), retrieving the content of a specific file existing in the DBMS, and issuing powerful commands to manipulate the operating system. Similarly, the SQL command can manipulate the cookies stored in a web application's database, allowing for actions such as retrieving, updating, or deleting cookie-related data, which could potentially be used for session management, user authentication, or tracking purposes.
Keywords: SQL injection, database, web application, SQL queries, vulnerabilities, detection, prevention.
Paper Id: 231290
Published On: 2022-01-04
Published In: Volume 10, Issue 1, January-February 2022
Cite This: A Study on SQL Injection Attacks. - Mohammed Mustafa Khan - IJIRMPS Volume 10, Issue 1, January-February 2022. DOI 10.5281/zenodo.13959661