SlideShare a Scribd company logo
1 of 2
Security Testing – SQL Injection

                 Now a day, Security Testing plays a leading role in developed software subjected to testing. SQL injection technique
                 gains more importance, when Security testing is concerned. SQL Injection vulnerabilities can cause a lot of damage
                 to a web application. A malicious user can possibly view records, delete records, drop tables or gain access to server

                 Many applications use some type of a database. An application under test might have some form of user interface
                 that accepts user input that may perform some of the following tasks

                 1.   Show the relevant stored data to the user e.g. the application checks the credentials of the user using the log in
                 information entered by the user and exposes only the relevant functionality and data to the user

                 2.   Save the data entered by the user to the database e.g. once the user fills up a form and submits it, the
                 application proceeds to save the data to the database; this data is then made available to the user in the same
                 session as well as in subsequent sessions

                 These input fields are the entry point for the hackers to play with SQL injection. Some of the user inputs might be
                 used in framing SQL statements that are then executed by the application on the database. It is possible for an
                 application NOT to handle the inputs given by the user properly. If this is the case, a malicious user could provide
                 unexpected inputs to the application that are then used to frame and execute SQL statements on the
                 database. This is called SQL injection. The consequences of such an action could be alarming.

                 The following things might result from SQL injection:

                 1. The user could log in to the application as another user, even as an administrator.

                 2. The user could view private information belonging to other users e.g. details of other users’ profiles, their
                 transaction details etc.

                 3. The user could change application configuration information and the data of the other users.

                 4. The user could modify the structure of the database; even delete tables in the application database.

                 5. The user could take control of the database server and execute commands on it at will.

                 Since the consequences of allowing the SQL injection technique could be severe, it follows that SQL injection should
                 be tested during the security testing of an application.

                 Important: The SQL injection problem should be tested only in the test environment.

                 SQL injection might be possible in applications that use SSL. Even a firewall might not be able to protect the
                 application against the SQL injection technique.




Visit IVESIA’S WEBSITE Follow us at LINKEDIN and TWITTER
How to inject SQL attacks?


                 1.   To start performing security testing for application against SQL attacks, one should look for the possible input entries, in

                      which User can enter SQL commands. Examples would be Login Page, User Submission Forms, Search Fields, Comments

                      Fields in Blogs, Forum Pages, sometimes even Email input fields


                 2.   Start framing SQL commands, which might attack application by deleting entries, altering existing information, commands

                      that retrieve database error which reveals some table information. Example: Entering a single quote (‘) in any textbox will

                      encounters a database error, it means that the user input is inserted in some query which is then executed by the application

               Few following inputs can be used in application, to see if they return database errors or produce reflective action in
               database

                          ' having 1=1 ---

                          ' or 1=1; drop table users; --

                          '; shutdown with nowait; --

                          '; exec master..xp_xxx; --

                          '; exec master..xp_cmdshell 'iisreset'; --

               Important: During security testing, the tester should be very careful not to modify any of the following:


                      Configuration of the application or the server


                      Services running on the server


                      Existing user or customer data hosted by the application

               Additionally, a security test should be avoided on a production system.

               The purpose of the security test is to discover the vulnerabilities of the web application so that the developers can
               then remove these vulnerabilities from the application and make the web application and data safe from unauthorized
               actions.

               Instead of manually testing whether the application is vulnerable to SQL injection or not, one could use a web
               vulnerability scanner that checks for SQL injection.




Visit IVESIA’S WEBSITE Follow us at LINKEDIN and TWITTER

More Related Content

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Security testing – sql injection

  • 1. Security Testing – SQL Injection Now a day, Security Testing plays a leading role in developed software subjected to testing. SQL injection technique gains more importance, when Security testing is concerned. SQL Injection vulnerabilities can cause a lot of damage to a web application. A malicious user can possibly view records, delete records, drop tables or gain access to server Many applications use some type of a database. An application under test might have some form of user interface that accepts user input that may perform some of the following tasks 1. Show the relevant stored data to the user e.g. the application checks the credentials of the user using the log in information entered by the user and exposes only the relevant functionality and data to the user 2. Save the data entered by the user to the database e.g. once the user fills up a form and submits it, the application proceeds to save the data to the database; this data is then made available to the user in the same session as well as in subsequent sessions These input fields are the entry point for the hackers to play with SQL injection. Some of the user inputs might be used in framing SQL statements that are then executed by the application on the database. It is possible for an application NOT to handle the inputs given by the user properly. If this is the case, a malicious user could provide unexpected inputs to the application that are then used to frame and execute SQL statements on the database. This is called SQL injection. The consequences of such an action could be alarming. The following things might result from SQL injection: 1. The user could log in to the application as another user, even as an administrator. 2. The user could view private information belonging to other users e.g. details of other users’ profiles, their transaction details etc. 3. The user could change application configuration information and the data of the other users. 4. The user could modify the structure of the database; even delete tables in the application database. 5. The user could take control of the database server and execute commands on it at will. Since the consequences of allowing the SQL injection technique could be severe, it follows that SQL injection should be tested during the security testing of an application. Important: The SQL injection problem should be tested only in the test environment. SQL injection might be possible in applications that use SSL. Even a firewall might not be able to protect the application against the SQL injection technique. Visit IVESIA’S WEBSITE Follow us at LINKEDIN and TWITTER
  • 2. How to inject SQL attacks? 1. To start performing security testing for application against SQL attacks, one should look for the possible input entries, in which User can enter SQL commands. Examples would be Login Page, User Submission Forms, Search Fields, Comments Fields in Blogs, Forum Pages, sometimes even Email input fields 2. Start framing SQL commands, which might attack application by deleting entries, altering existing information, commands that retrieve database error which reveals some table information. Example: Entering a single quote (‘) in any textbox will encounters a database error, it means that the user input is inserted in some query which is then executed by the application Few following inputs can be used in application, to see if they return database errors or produce reflective action in database ' having 1=1 --- ' or 1=1; drop table users; -- '; shutdown with nowait; -- '; exec master..xp_xxx; -- '; exec master..xp_cmdshell 'iisreset'; -- Important: During security testing, the tester should be very careful not to modify any of the following: Configuration of the application or the server Services running on the server Existing user or customer data hosted by the application Additionally, a security test should be avoided on a production system. The purpose of the security test is to discover the vulnerabilities of the web application so that the developers can then remove these vulnerabilities from the application and make the web application and data safe from unauthorized actions. Instead of manually testing whether the application is vulnerable to SQL injection or not, one could use a web vulnerability scanner that checks for SQL injection. Visit IVESIA’S WEBSITE Follow us at LINKEDIN and TWITTER