-->

Part 3 SQL Injection


sql injection

website hacking

According to Wikipedia

SQL injection is a code injection technique used to attack data-driven applications, where malicious SQL statements are inserted into an input field for execution (for example, to dump database content to the attacker).

A Basic HTML Website does not include a SQL database based on structured query language. So, this kind of hack only works for SQL-based websites.

What is a database? Why is it important for a website?

A database is a collection of data that is called by an application as needed.

Let’s get help from an example to explain this.

The attendance record of a class contains the daily attendance records of each student, you can say this is a course attendance database. Whenever any student has to count their absences, the registration is taken for analysis, the same thing happens on a website. When a new user signed up for a website, all of their information was stored in the website’s database in the future.

How Does A Hacker Hack A Website?

Data, even Management data is Stored in a Database with SQL (Structured Query Language). So, if the hacker somehow gains access to the database, it can retrieve the stored administration password (Owner’s Password to access the Admin panel of the Website. Where you can add content and even delete the website completely)

But That Is Not Enough, Many Criminal Hackers Access and Make Money With The Database Of Online Shopping Websites To Get Stored Credit Cards And Other Confidential Information

At first, scan the entire website for Vulnerabilities in Hacker Database.

After finding a loophole, it injects malicious code into the database.

Finally the database is accessed and dumped (downloaded to your computer with all the information)

SQLI Damper

SQLI Dumper is a hidden program developed to find websites with weak security from the internet, and this program is powerful enough to dump databases quickly.

For example, specific “Dorks” is entered in the search option. Php? =

Therefore, websites containing this string will be scanned first.

A list of websites appears on the screen after successful scanning.

In the next step, this list is scanned again to find exploitable websites.

Finally, the shortlisted website is scanned for injectable websites that can be easily hacked with this program.

Simple, right?

Definitely not.

If any hacker does this without prior knowledge of hiding their IP (internet protocol), which is the unique ID of each internet user, they will certainly be in trouble.

Hiding a rope is an art and a completely different secret that no one will tell you. But we’ll go into this to explain it in more detail in another section.

Hacking is a crime, but having an information can save you from being hacked.

It depends on you. How do you use this information? As well as the fire can burn you, it can also cook for you.

NEXT ARTICLE Next Post
PREVIOUS ARTICLE Previous Post
NEXT ARTICLE Next Post
PREVIOUS ARTICLE Previous Post