SlideShare a Scribd company logo
Web Application
--------------------------------
Website
----------------
A website is platform to present information about a company (or organization), an
individual etc.
Essentially, it is a collection of documents known as webpages that contain information:
images, words, digital media, and alike.
Types of websites
--------------------------------
Static websites: - Static Websites can be defined as those which are not database driven.
They can be developed by basic knowledge of web technologies like HTML and CSS. They
present the information to the users/visitor in the most direct way as it is stored on the web
server. These website do not have any control panel. They are driven through FTP clients
that connect to the host server. A simple example of a static website could be an
organization website providing details about its portfolio, contacts, resources, projects etc.
Dynamic websites: - Dynamic websites can be defined as those that require database to
store and retrieve the information. They have features such as insert new data, fetch data,
update/modify data, and delete data etc. which are not present in the static websites. These
websites have a control panels through which the administrator can make changes as per
the requirement. Some of the most popular enterprise database used are: - Oracle, MySQL,
SQL Server, DB2 etc.
Parts of web application
-----------------------------------------
Front end: It is that part of the web site which a user can see and interact.
Back end: Also called as back-end technology infrastructure consists of an application, a
database and a server. All the data is stored in the database.
SQL (Structured Query Language)
------------------------------------------------
It is a standard programming languages designed to interact with the database.
With the help of SQL the data from the front end is stored into the back-end. Similarly, the
data from the back-end is retrieved and presented at the front-end.
Admin Login Page
------------------------------
It is the page where the administrator enters the control panel of the website to make
changes. Generally the link for admin panel are as follows:-
"adminlogin.php" "admin/login.php" "administrator.php" "login/admin.php"
"adminlogin.asp" "admin/login.asp" "adminstrator.asp" "login/admin.asp"
"adminlogin.aspx" "admin/login.aspx" "adminstrator.aspx" "login/admin.aspx"
How to target admin login page?
-----------------------------------------------------
Login with random username and password:-
-----------------------------------------------------------------------
Username =========> hacker
Password ==========>pass1234
LOGIN
Simple check deployed behind most of the websites:
----------------------------------------------------------------------------------
if username.text ="xyz" and password.text="pass" then
welcome.show()
else
msgbox("Invalid username or password.")
The above method is highly unsecured since it just checks the conditions to be true, it does
not validate the entered username and password.
-Any true condition can be used to hack into the website.
Example: ‘or’ ‘=’, ‘1=1’ etc.
-It is called condition based matching.
-Secured way can be using Stored Procedure.
Random Attacking
------------------------------
Go to google.com  adminlogin.aspx
Target Based Attacking
------------------------------------
google.com: site: target.com admin
google.com: site: target.com adminlogin
How to protect the attack?
-------------------------------------------
 Never use traditional name for admin page.
Use page like: xyz@c3r.php
 Always use Email or Numeric character as username.
 Filter the special character at the client end.
 Do have fake messages for hackers.
The following script can prevent SQL injection attacks on a web application.
---------------------------------------------------------------------------------------------------------------------
Checking the working of the above script.
----------------------------------------------------------------

More Related Content

Viewers also liked

Prezi. Quezada
Prezi. QuezadaPrezi. Quezada
Prezi. Quezada
Maria Quezada
 
Periferal sistem komputer powerpoint
Periferal sistem komputer powerpointPeriferal sistem komputer powerpoint
Periferal sistem komputer powerpointfendi_setyawan
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
Anuj Khandelwal
 
Women in Rotary: Fantasy Draft
Women in Rotary: Fantasy DraftWomen in Rotary: Fantasy Draft
Women in Rotary: Fantasy DraftRotaractLB
 
Rotary Assembly: Social Media 101
Rotary Assembly: Social Media 101Rotary Assembly: Social Media 101
Rotary Assembly: Social Media 101RotaractLB
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
Anuj Khandelwal
 
Building a Strong Team Culture
Building a Strong Team CultureBuilding a Strong Team Culture
Building a Strong Team CultureRotaractLB
 
4. kemiskinan, ketimpangan, dan pembangunan
4. kemiskinan, ketimpangan, dan pembangunan4. kemiskinan, ketimpangan, dan pembangunan
4. kemiskinan, ketimpangan, dan pembangunanMiracLe Min
 

Viewers also liked (8)

Prezi. Quezada
Prezi. QuezadaPrezi. Quezada
Prezi. Quezada
 
Periferal sistem komputer powerpoint
Periferal sistem komputer powerpointPeriferal sistem komputer powerpoint
Periferal sistem komputer powerpoint
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
 
Women in Rotary: Fantasy Draft
Women in Rotary: Fantasy DraftWomen in Rotary: Fantasy Draft
Women in Rotary: Fantasy Draft
 
Rotary Assembly: Social Media 101
Rotary Assembly: Social Media 101Rotary Assembly: Social Media 101
Rotary Assembly: Social Media 101
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
 
Building a Strong Team Culture
Building a Strong Team CultureBuilding a Strong Team Culture
Building a Strong Team Culture
 
4. kemiskinan, ketimpangan, dan pembangunan
4. kemiskinan, ketimpangan, dan pembangunan4. kemiskinan, ketimpangan, dan pembangunan
4. kemiskinan, ketimpangan, dan pembangunan
 

Similar to How to protect the admin login page from SQL Injection.

web services8 (1).pdf for computer science
web services8 (1).pdf for computer scienceweb services8 (1).pdf for computer science
web services8 (1).pdf for computer science
optimusnotch44
 
ideas.doc
ideas.docideas.doc
ideas.docbutest
 
web development
web developmentweb development
web development
Sevajothi Crafts
 
Overview of ASP.Net by software outsourcing company india
Overview of ASP.Net by software outsourcing company indiaOverview of ASP.Net by software outsourcing company india
Overview of ASP.Net by software outsourcing company india
Jignesh Aakoliya
 
C# Unit5 Notes
C# Unit5 NotesC# Unit5 Notes
C# Unit5 Notes
Sudarshan Dhondaley
 
Roll Your Own Content Management System
Roll Your Own Content Management SystemRoll Your Own Content Management System
Roll Your Own Content Management System
guest0fe006
 
Tableau Architecture
Tableau ArchitectureTableau Architecture
Tableau Architecture
Vivek Mohan
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Softwarewebhostingguy
 
Microsoft Windows Network Auditing and Reporting Solution
Microsoft Windows Network Auditing and Reporting SolutionMicrosoft Windows Network Auditing and Reporting Solution
Microsoft Windows Network Auditing and Reporting Solution
Vyapin Software Systems Private Limited
 
All-Squared-LVAC-Web-Design.ppt
All-Squared-LVAC-Web-Design.pptAll-Squared-LVAC-Web-Design.ppt
All-Squared-LVAC-Web-Design.ppt
kulmiyealiabdille
 
Windows Hosting Documentation
Windows Hosting DocumentationWindows Hosting Documentation
Windows Hosting Documentationwebhostingguy
 
Dos1
Dos1Dos1
Online old books sales by hemraj gahlot
Online old books sales by hemraj gahlotOnline old books sales by hemraj gahlot
Online old books sales by hemraj gahlotHemraj Gahlot
 
An Introduction to On-Demand, Web-Based Publishing
An Introduction to On-Demand, Web-Based PublishingAn Introduction to On-Demand, Web-Based Publishing
An Introduction to On-Demand, Web-Based Publishing
STC-Philadelphia Metro Chapter
 
Information Management & Sharing in Digital Era
Information Management & Sharing in Digital Era Information Management & Sharing in Digital Era
Information Management & Sharing in Digital Era
Liaquat Rahoo
 
Web application architecture
Web application architectureWeb application architecture
Web application architecture
Tejaswini Deshpande
 
History of Web Technology
History of Web TechnologyHistory of Web Technology
History of Web Technology
Shuvo Malakar
 
Microsoft Dynamics CRM – Web Resources
Microsoft Dynamics CRM – Web ResourcesMicrosoft Dynamics CRM – Web Resources
Microsoft Dynamics CRM – Web Resources
Ducat India
 
Adding Data into your SOA with WSO2 WSAS
Adding Data into your SOA with WSO2 WSASAdding Data into your SOA with WSO2 WSAS
Adding Data into your SOA with WSO2 WSAS
sumedha.r
 

Similar to How to protect the admin login page from SQL Injection. (20)

web services8 (1).pdf for computer science
web services8 (1).pdf for computer scienceweb services8 (1).pdf for computer science
web services8 (1).pdf for computer science
 
ideas.doc
ideas.docideas.doc
ideas.doc
 
web development
web developmentweb development
web development
 
Overview of ASP.Net by software outsourcing company india
Overview of ASP.Net by software outsourcing company indiaOverview of ASP.Net by software outsourcing company india
Overview of ASP.Net by software outsourcing company india
 
Res hack
Res hackRes hack
Res hack
 
C# Unit5 Notes
C# Unit5 NotesC# Unit5 Notes
C# Unit5 Notes
 
Roll Your Own Content Management System
Roll Your Own Content Management SystemRoll Your Own Content Management System
Roll Your Own Content Management System
 
Tableau Architecture
Tableau ArchitectureTableau Architecture
Tableau Architecture
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
 
Microsoft Windows Network Auditing and Reporting Solution
Microsoft Windows Network Auditing and Reporting SolutionMicrosoft Windows Network Auditing and Reporting Solution
Microsoft Windows Network Auditing and Reporting Solution
 
All-Squared-LVAC-Web-Design.ppt
All-Squared-LVAC-Web-Design.pptAll-Squared-LVAC-Web-Design.ppt
All-Squared-LVAC-Web-Design.ppt
 
Windows Hosting Documentation
Windows Hosting DocumentationWindows Hosting Documentation
Windows Hosting Documentation
 
Dos1
Dos1Dos1
Dos1
 
Online old books sales by hemraj gahlot
Online old books sales by hemraj gahlotOnline old books sales by hemraj gahlot
Online old books sales by hemraj gahlot
 
An Introduction to On-Demand, Web-Based Publishing
An Introduction to On-Demand, Web-Based PublishingAn Introduction to On-Demand, Web-Based Publishing
An Introduction to On-Demand, Web-Based Publishing
 
Information Management & Sharing in Digital Era
Information Management & Sharing in Digital Era Information Management & Sharing in Digital Era
Information Management & Sharing in Digital Era
 
Web application architecture
Web application architectureWeb application architecture
Web application architecture
 
History of Web Technology
History of Web TechnologyHistory of Web Technology
History of Web Technology
 
Microsoft Dynamics CRM – Web Resources
Microsoft Dynamics CRM – Web ResourcesMicrosoft Dynamics CRM – Web Resources
Microsoft Dynamics CRM – Web Resources
 
Adding Data into your SOA with WSO2 WSAS
Adding Data into your SOA with WSO2 WSASAdding Data into your SOA with WSO2 WSAS
Adding Data into your SOA with WSO2 WSAS
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

How to protect the admin login page from SQL Injection.

  • 1. Web Application -------------------------------- Website ---------------- A website is platform to present information about a company (or organization), an individual etc. Essentially, it is a collection of documents known as webpages that contain information: images, words, digital media, and alike. Types of websites -------------------------------- Static websites: - Static Websites can be defined as those which are not database driven. They can be developed by basic knowledge of web technologies like HTML and CSS. They present the information to the users/visitor in the most direct way as it is stored on the web server. These website do not have any control panel. They are driven through FTP clients that connect to the host server. A simple example of a static website could be an organization website providing details about its portfolio, contacts, resources, projects etc. Dynamic websites: - Dynamic websites can be defined as those that require database to store and retrieve the information. They have features such as insert new data, fetch data, update/modify data, and delete data etc. which are not present in the static websites. These websites have a control panels through which the administrator can make changes as per the requirement. Some of the most popular enterprise database used are: - Oracle, MySQL, SQL Server, DB2 etc. Parts of web application ----------------------------------------- Front end: It is that part of the web site which a user can see and interact. Back end: Also called as back-end technology infrastructure consists of an application, a database and a server. All the data is stored in the database. SQL (Structured Query Language) ------------------------------------------------ It is a standard programming languages designed to interact with the database. With the help of SQL the data from the front end is stored into the back-end. Similarly, the data from the back-end is retrieved and presented at the front-end.
  • 2. Admin Login Page ------------------------------ It is the page where the administrator enters the control panel of the website to make changes. Generally the link for admin panel are as follows:- "adminlogin.php" "admin/login.php" "administrator.php" "login/admin.php" "adminlogin.asp" "admin/login.asp" "adminstrator.asp" "login/admin.asp" "adminlogin.aspx" "admin/login.aspx" "adminstrator.aspx" "login/admin.aspx" How to target admin login page? ----------------------------------------------------- Login with random username and password:- ----------------------------------------------------------------------- Username =========> hacker Password ==========>pass1234 LOGIN
  • 3. Simple check deployed behind most of the websites: ---------------------------------------------------------------------------------- if username.text ="xyz" and password.text="pass" then welcome.show() else msgbox("Invalid username or password.") The above method is highly unsecured since it just checks the conditions to be true, it does not validate the entered username and password. -Any true condition can be used to hack into the website. Example: ‘or’ ‘=’, ‘1=1’ etc. -It is called condition based matching. -Secured way can be using Stored Procedure. Random Attacking ------------------------------ Go to google.com  adminlogin.aspx Target Based Attacking ------------------------------------ google.com: site: target.com admin google.com: site: target.com adminlogin How to protect the attack? -------------------------------------------  Never use traditional name for admin page. Use page like: xyz@c3r.php  Always use Email or Numeric character as username.  Filter the special character at the client end.  Do have fake messages for hackers.
  • 4. The following script can prevent SQL injection attacks on a web application. ---------------------------------------------------------------------------------------------------------------------
  • 5. Checking the working of the above script. ----------------------------------------------------------------