100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Dissertation: SQL Injection attacks and how to prevent them

Rating
-
Sold
-
Pages
86
Grade
A
Uploaded on
24-09-2022
Written in
2022/2023

This dissertation introduces different kind of injection techniques, explores them and proposes prevention techniques as well. At present, web applications have been used for most of our activities in our life. Web applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique that attackers appoint to impose the database in the most of web applications, by manipulate the SQL queries that send to RDBMS. Hence, change the behaviour of the application. Databases are a large warehouse of the software industry where all the data of the experts and users are stored. Cloud databases are large databases where there is access to unlimited storage space. A sequential query language is a language that is used to write and pass queries in the database. SQL injection is the threat of the virus generated by the external agents to harm the system. SQL injection is most effective with queries. Prevention techniques have been introduced in this dissertation from the threats generated by the SQL injection. This dissertation gives a brief about the SQL injection threats and prevention techniques.  Literature review

Show more Read less
Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Unknown
Course

Document information

Uploaded on
September 24, 2022
Number of pages
86
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Dissertation Title: SQL Injection attacks and how to
prevent them

, Abstract




This dissertation introduces different kind of injection techniques, explores them and
proposes prevention techniques as well.

At present, web applications have been used for most of our activities in our life. Web
applications are affected by the attacks of SQL injection. SQL injection is a prevalent
technique that attackers appoint to impose the database in the most of web applications, by
manipulate the SQL queries that send to RDBMS. Hence, change the behaviour of the
application.

Databases are a large warehouse of the software industry where all the data of the experts and
users are stored. Cloud databases are large databases where there is access to unlimited
storage space. A sequential query language is a language that is used to write and pass
queries in the database. SQL injection is the threat of the virus generated by the external
agents to harm the system. SQL injection is most effective with queries. Prevention
techniques have been introduced in this dissertation from the threats generated by the SQL
injection. This dissertation gives a brief about the SQL injection threats and prevention
techniques.




2

,Table of Contents
Abstract.............................................................................................................................2
Table of figures..................................................................................................................4
1. Introduction...................................................................................................................6
1.1 Motivation...................................................................................................................8
1.2 Research aim and requirements...................................................................................9
1.3. Previous findings.......................................................................................................11
1.4. Dissertation structure................................................................................................12
2. Literature review..........................................................................................................13
2.1. Research methodology..............................................................................................16
2.2. SQL Injection Attacks.................................................................................................19
2.3. Types of SQL Injection attacks...................................................................................19
3. Practical work..............................................................................................................24
3.1. Practical examples of SQL attacks and its prevention.................................................25
The above query, when used in code will not return any information about the question
and ask for complete details. Even after the hacker tries to purchase the user ID and
password. The attack is identified by the code, and the account is secured.......................28
3.2. Theoretical implication..............................................................................................28
3.3. Prevention techniques...............................................................................................29
4. Implementation of practical work.................................................................................31
4.1. SQL Injection Attack demo 1:.....................................................................................31
4.2. SQL Injection attack demo 2:.....................................................................................39
4.3. SQL Injection attack demo 3:.....................................................................................47
4.4. SQL Injection Attack demo 4:.....................................................................................48
5. Results, analysis and evaluation...................................................................................63
Conclusion........................................................................................................................67
Recommendations...........................................................................................................67
References.......................................................................................................................68
APPENDIX A: Ethical Approval..........................................................................................71
Appendix B: Gantt Chart for the dissertation....................................................................85




3

, Table of figures
Figure 1.1. SQL injection attack process...................................................................................9
Figure 2: SQL injection attack.................................................................................................12
Figure 3: SQL Injection, Detection and Preventions...............................................................15
Figure 4....................................................................................................................................25
Figure 5....................................................................................................................................26
Figure 6....................................................................................................................................26
Figure 7....................................................................................................................................27
Figure 8....................................................................................................................................27
Figure 9....................................................................................................................................28
Figure 10..................................................................................................................................28
Figure 11: Acunetix..................................................................................................................31
Figure 12: When we use “2” it will display other data............................................................32
Figure 13: Fetch Array.............................................................................................................32
Figure 14: Error reflects after the query we got.......................................................................33
Figure 15: Reflect the Database name......................................................................................34
Figure 16: Reflecting the version of database running.............................................................34
Figure 17: Reflecting system user data....................................................................................35
Figure 18: Fetch the table name at 1 row value.......................................................................35
Figure 19: Collecting the full table name at once....................................................................36
Figure 20: Fetching the user table information........................................................................36
Figure 21: Getting the password from user table.....................................................................37
Figure 22: Fetching the credit card information.......................................................................38
Figure 23: Fetching the mail id data.........................................................................................38
Figure 24..................................................................................................................................39
Figure 25: Locating URL.........................................................................................................40
Figure 26..................................................................................................................................40
Figure 27..................................................................................................................................41
Figure 28..................................................................................................................................42

4
$17.77
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
georgianapatrascan

Get to know the seller

Seller avatar
georgianapatrascan Northumbria University
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
3 year
Number of followers
0
Documents
23
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions