Recent Articles
Sql Injection For Beginners: Tutorial 1


Many times my readers have asked me to write about SQL Injection, but i always used to consider that its pretty easy way of hacking and may be everyone already know about it.
But now after years I think that, no, i was wrong.Still even many of web developers dont know about sql injection, still I can see many poorly designed websites which are prone to sql injection, one can easily beark into such websites using a simple SQL statement.
So my this post is dedicated to those web developers who leave this hole in their projects, and also to those who want to learn hacking, this is the easiest thing that anyone can do without any, any experience.
What is SQL Injection:
SQL Injection arises because the fields available for user input allow SQL statements to pass through and query the database directly.
SQL Injection, In simple terms:
But on the SQL injection vulnerable Webpage, one can enter into even without knowing the username or password. The database passes the query and let the user enter even without knowing the correct username and password.
This technique is mainly used to break into any website to steal the secret information. but once any one enters into the site, then he/she can do many harmful things too. Think, if a hacker login into a website as ADMIN then he/she can get permission to do many very bad things with that website.
How to Use SQL Injection:
To Use SQL Injection is very easy. In a SQL injection vulnerable login form instead of true username and password, you can enter the following SQL statement.
' or '1'='1
Or,
If you know the Username then fill this code in password field, to enter into the website by pretending to be anyone else.
Mostly websites have some common users with the username like 'Admin' or 'Administrator' for Administrator login. Other possible username includes 'Employee' , 'Student' etc. Enter into a website with different usernames can give different permission and can display different information too.
Not even this you can do many more things using SQL Injection thing, wait and watch for my next post about SQL injection for More details.
Till then Enjoy and Be safe.
Check out other posts under category hacking.


1 comments for this post
Leave a reply
Subscribe to:
Post Comments (Atom)
TechByte4U on Facebook
Popular Posts
Free winrar, Full version Winrar, Winrar Serial key I guess everyone know what is Winrar, and what it works. So without going into t...
Previously i have posted about how to hack any account using phishing pages.... Now in this post i m gonna explain how you can make phi...
Hey Friends, In my last post i have told you about the browser's fact of storing passwords after prompting 'Do you want t...
In response to query asked by Ameer Hasan Malik Did you forget your windows login password? or want to access Admin account in schoo...
Google Chrome was one of the first browsers to have multiple processes . If you are a frequent Google Chrome user, then you probabel...
Have you seen the illusion pictures that ask you to stare on the picture for some seconds and then blink your eyes to see the celebrity? Im...
Note: This post is for educational purpose. Its up to you only, how you use this information. I will not be responsible for any dama...
Through out a day, almost all computer user do many repetitive tasks on computer and internet. If you are one of them, then Macro recor...
Google Chrome was one of the first browsers to have multiple processes, which creates a separate process for each tab. That means ...
Welcome to the era of trickery, where you may be able to trust your some friends, but can no longer trust their e-mails. Identity theft...
Nitin Bansal
February 14, 2012 at 7:58 PM
m waiting 4 ur new post......and can u tel me, do u know all types of hacking