Recent Articles
Sql Injection For Beginners: Tutorial 1
Monday, February 13, 2012|
Surbhi Verma
Many times my readers have asked me to write about SQL Injection, but i always used to consider that its pretty easy way of hacking and may be everyone already know about it.
But now after years I think that, no, i was wrong.Still even many of web developers dont know about sql injection, still I can see many poorly designed websites which are prone to sql injection, one can easily beark into such websites using a simple SQL statement.
So my this post is dedicated to those web developers who leave this hole in their projects, and also to those who want to learn hacking, this is the easiest thing that anyone can do without any, any experience.
What is SQL Injection:
SQL Injection arises because the fields available for user input allow SQL statements to pass through and query the database directly.
SQL Injection, In simple terms:
But on the SQL injection vulnerable Webpage, one can enter into even without knowing the username or password. The database passes the query and let the user enter even without knowing the correct username and password.
This technique is mainly used to break into any website to steal the secret information. but once any one enters into the site, then he/she can do many harmful things too. Think, if a hacker login into a website as ADMIN then he/she can get permission to do many very bad things with that website.
How to Use SQL Injection:
To Use SQL Injection is very easy. In a SQL injection vulnerable login form instead of true username and password, you can enter the following SQL statement.
' or '1'='1
Or,
If you know the Username then fill this code in password field, to enter into the website by pretending to be anyone else.
Mostly websites have some common users with the username like 'Admin' or 'Administrator' for Administrator login. Other possible username includes 'Employee' , 'Student' etc. Enter into a website with different usernames can give different permission and can display different information too.
Not even this you can do many more things using SQL Injection thing, wait and watch for my next post about SQL injection for More details.
Till then Enjoy and Be safe.
Check out other posts under category hacking.
Posted in
Hacking Stuff
1 comments for this post
Leave a reply
Subscribe to:
Post Comments (Atom)
TechByte4U on Facebook
Popular Posts
Free winrar, Full version Winrar, Winrar Serial key I guess everyone know what is Winrar, and what it works. So without going into t...
Hey Friends, In my last post i have told you about the browser's fact of storing passwords after prompting 'Do you want t...
Hello Guys, Here is the step by step procedure to Apply an image as background of any drive say C:, D:........ Step 1: O...
free idm, serial key Internet Download Manager(also known as Idman) is an excellent internet download accelerator that will care of...
In last part i have explained the basics of cookie stealing, and happy to know that many of you are really excited to get the secon...
Hi Friends.... Do you know...you can use keyboard instead of mouse to operate your system... Many of you will say...yes, we ca...
In response to query asked by Ameer Hasan Malik Did you forget your windows login password? or want to access Admin account in schoo...
A mazing Photo Effects An online Photo Editor with more than hundred photo effects where you can upload your pics and get an amazing p...
How to inverse colors on a Picture. " Stare at the image then close your eyes, you will see Jesus." When first time I sa...
Have you seen the illusion pictures that ask you to stare on the picture for some seconds and then blink your eyes to see the celebrity? Im...
Nitin Bansal
February 14, 2012 at 7:58 PM
m waiting 4 ur new post......and can u tel me, do u know all types of hacking