preview

Essay On SQL Injection Execution

Better Essays

Step-By-Step SQL Injection Execution
Steps that will be provided here are well known and can even be web searched and YouTubed for visual instruction. These SQL injection query code is the top and standardized code since SQL was first introduced. A YouTube channel called Rajawat Technology, on the video called “How TO Hack Websites | Using SQL injection | attack 22/01/2017,” provides the following steps in visual format. Before delving in there are a couple extra precautions recommended to take that the YouTube channel does not provide.
One thing not provided on this YouTube video is to download and utilize a Virtual Machine. This gives an extra barrier of identification for a Hacker. It is strongly suggested to download Kali Linux or …show more content…

Approve and accept the privileges it request. Once it is downloaded, it will automatically be connected via Proxy server.
2. Once connected via Proxy server, go back to Google and type: adminlogin.asp/aspx This will open admin panel of websites. Once clicking search, select any website that promotes or requires an account.
3. Now here comes the SQL injection exploitation. Once in the website, go to the login page. In both the Username and Password field, type the following SQL injection code: ‘ or ’1’=’1 (there is a space between the apostrophe and the word or, and another following space between the word or an apostrophe). Afterwards, select Login.
4. Congratulations, this SQL injection successfully has provided Administrative access to the targeted website. For any reason the SQL injection did not work, then it goes to show that website has patched that SQL injection attack as a login option.
There are various but similar SQL injection codes that are utilized to exploit website accounts. But the Hacker has to be well versed with SQL query language. Not that a quick search and some dedication to obtaining that information is not feasible. Finally having understood the step-by-step SQL injection execution, let’s look into how to mitigate SQL injections. (Kali, 2017)
SQL Injection Mitigation
Most important standardized precautions for any database is what is referred to as sanitation and validation.

Get Access