BY:- Ashish Gharti
Bijay Limbu Senihang
 Founder of Nep Security
www.nepsecurity.org
www.facebook.com/groups/nepsec
 IT Security Researcher
 Information Security Consultant at Entrust
Solution Nepal.
 The vulnerability that results when you
give an attacker the ability to influence the
Structured Query Language (SQL) queries
that an application passes to a back-end
database.
 Poorly Filtered Strings
 Incorrect Type Handling
 Signature Evasion
 Filter Bypassing
 Blind SQL Injection
 Data Leakage.
 Embarrassment (Site Deface)
 Malware Infection.
 Medium for Spear Phishing.
 addslashes ()
 mysql_real_escape_string()
 is_numeric()
 sprintf()
 htmlentities($var, ENT_QUOTES)
The impact of sqli (sql injection)
The impact of sqli (sql injection)

The impact of sqli (sql injection)

  • 1.
  • 2.
     Founder ofNep Security www.nepsecurity.org www.facebook.com/groups/nepsec  IT Security Researcher  Information Security Consultant at Entrust Solution Nepal.
  • 3.
     The vulnerabilitythat results when you give an attacker the ability to influence the Structured Query Language (SQL) queries that an application passes to a back-end database.
  • 4.
     Poorly FilteredStrings  Incorrect Type Handling  Signature Evasion  Filter Bypassing  Blind SQL Injection
  • 5.
     Data Leakage. Embarrassment (Site Deface)  Malware Infection.  Medium for Spear Phishing.
  • 7.
     addslashes () mysql_real_escape_string()  is_numeric()  sprintf()  htmlentities($var, ENT_QUOTES)