cyber crime an eye opener 144 te 2 t-7

19
CYBER CRIME AN EYE OPENER – SQL INJECTION (SQLIA’S) Gargee S Hiray TE 2 Roll no : 144 Seminar Guide Prof.S A Shinde

Upload: gargee-hiray

Post on 27-Jun-2015

102 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Cyber crime an eye opener  144 te 2 t-7

CYBER CRIME AN EYE OPENER – SQL INJECTION (SQLIA’S)

Gargee S HirayTE 2 Roll no : 144

Seminar Guide Prof.S A Shinde

Page 2: Cyber crime an eye opener  144 te 2 t-7

SOME QUESTIONS ?

What are we so concerned about? What are we trying to protect? What an Ethical Hacker is and does ?

Page 3: Cyber crime an eye opener  144 te 2 t-7

WHAT ARE WE SO CONCERNED ABOUT?

Page 4: Cyber crime an eye opener  144 te 2 t-7

WHAT ARE WE TRYING TO PROTECT?

Page 5: Cyber crime an eye opener  144 te 2 t-7

WHAT AN HACKER IS AND DOES ?

Someone who seeks and exploits weaknesses in a computer system or computer network

Who makes innovative customizations or computer equipment.

Who combines excellence, playfulness and cleverness in performed activities

Page 6: Cyber crime an eye opener  144 te 2 t-7

TYPES OF HACKERS

Page 7: Cyber crime an eye opener  144 te 2 t-7

OVER VIEW

What is SQL INJECTION ? How common is it? Can we hack website easily ? How does it work ? Finding SQL Injection . Protecting against SQL Injection Impact of SQL Injection. SQL injection Conclusion.

Page 8: Cyber crime an eye opener  144 te 2 t-7

WHAT IS SQL INJECTION?

SQL Injections are attacks by which an attacker alters the structure of the original SQL query by injecting SQL code in the input fields of the web form in order to gain unauthorized access to the database.

Page 9: Cyber crime an eye opener  144 te 2 t-7

HOW COMMON IS IT?

It is probably the most common Website vulnerability today!

It is a flaw in "web application" development,

it is not a DB or web server problem More than 60 % of the websites are Hacked

due to SQL Injection .

Page 10: Cyber crime an eye opener  144 te 2 t-7

CAN WE HACK WEBSITE EASILY ?

Page 11: Cyber crime an eye opener  144 te 2 t-7

HOW DOES IT WORK ?

Page 12: Cyber crime an eye opener  144 te 2 t-7
Page 13: Cyber crime an eye opener  144 te 2 t-7

FINDING SQL INJECTION

1. Submit a single quote as input ' If an error results, app is vulnerable.If no error, check for any output changes.

2. Submit two single quotes.Databases use ’’ to represent literal ’If error disappears, app is vulnerable.

3. Try string or numeric operators.

Page 14: Cyber crime an eye opener  144 te 2 t-7

EXAMPLES

' or '1'='1' -- ' ' or '1'='1' ({ ‘ ' or '1'='1' /* ‘ ' or '1'=‘1

Page 15: Cyber crime an eye opener  144 te 2 t-7

PROTECTING AGAINST SQL INJECTION strong design correct input validation

Page 16: Cyber crime an eye opener  144 te 2 t-7

IMPACT OF SQL INJECTION

1. Leakage of sensitive information.2. Reputation decline.3. Modification of sensitive information.4. Loss of control of db server.5. Data loss.

Page 17: Cyber crime an eye opener  144 te 2 t-7

SQL INJECTION CONCLUSION SQL injection is technique for exploiting

applications that use relational databases as their back end.

Transform the innocent SQL calls to a malicious call

Cause unauthorized access, deletion of data, or theft of information

Page 18: Cyber crime an eye opener  144 te 2 t-7

REFERENCES SQL INJECTIONS – A HAZARD TO WEB APPLICATIONS

By- Neha Singh and Ravindra Kumar Purwar Issue 6, June 2012.

SQL INJECTION ATTACKS DETECTION IN ADVERSARI AL ENVIRONMENTS BY

K-CENTERS Issue 15-17 July, 2012

http://www.britannica.com/EBchecked/topic/130595/cybercrime

http://www.acunetix.com/websitesecurity/sql-injection/

Page 19: Cyber crime an eye opener  144 te 2 t-7

THANK YOU Any Query ?