SQL Injection and Protection
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Sandesh K R
Active In SP
**

Posts: 4
Joined: Mar 2010
#1
06-04-2010, 12:44 PM


I need the information regarding SQL injection and protection . Please if any one has the report or ppt or else any info regarding this topic please post it...

please help me out its really very urgent .. i am trying to find out info regarding this but not able to fetch more ...
Reply
reports-crawler
Active In SP
**

Posts: 291
Joined: Apr 2010
#2
07-04-2010, 01:10 AM

SQL injection attack
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.

Forms of vulnerability
Incorrectly filtered escape characters: occurs when user input is not filtered for escape characters and is then passed into an SQL statement which results in the potential manipulation of the statements performed on the database by the end user of the application.

Incorrect type handling:
It occurs when a user supplied field is not strongly typed or is not checked for type constraints.

Vulnerabilities inside the database server:
vulnerabilities that can exist within the database server software itself, would allow an attacker to perform a successful SQL injection attack based on bad Unicode characters even if the user's input is being escaped.

Blind SQL injection:
It is is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker.

Preventing SQL injection
The main defense is user input must not directly be embedded in SQL statements. user input must be carefully escaped or filtered or parameterized statements must be used.

for more details, refer:
en.wikipediawiki/SQL_injection

.pdf   A Classification of SQL Injection Attacks.pdf (Size: 132.92 KB / Downloads: 59)
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Sad a project topic for consumer protection act Guest 1 54 31-10-2016, 11:39 AM
Last Post: amrutha735
  project report on consumer protection act 1986 Guest 1 63 29-10-2016, 02:51 PM
Last Post: Dhanabhagya
  blind man protection system against obstacle circuit diagram Guest 1 62 11-10-2016, 12:47 PM
Last Post: amrutha735
  ppt overload protection of transformer project Guest 1 56 11-10-2016, 12:01 PM
Last Post: amrutha735
  data minimization and storage using xml enabled sql server abstract Guest 1 49 08-10-2016, 02:56 PM
Last Post: amrutha735
  lightning protection using lfa m electrical seminar download Guest 1 93 23-08-2016, 04:12 PM
Last Post: mkaasees
  electronics protection to exam paper leakage ppt Guest 1 59 09-02-2016, 12:29 PM
Last Post: mkaasees
  model of differential protection of busbar in simulink Guest 0 53 24-01-2016, 02:54 AM
Last Post: Guest
  differential protection project report Guest 0 49 18-01-2016, 09:47 PM
Last Post: Guest
  whiplash protection system seminar report Guest 0 61 18-01-2016, 08:20 AM
Last Post: Guest