{"id":431,"date":"2025-04-27T20:45:32","date_gmt":"2025-04-27T20:45:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jb23435\/?page_id=431"},"modified":"2025-04-27T20:53:36","modified_gmt":"2025-04-27T20:53:36","slug":"sql-injection-attacks","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jb23435\/sql-injection-attacks\/","title":{"rendered":"SQL Injection Attacks"},"content":{"rendered":"\n<p>The objective of the project is to provide hands-on experience on web security as well as SQL<br>injection attack. We also want to show how such attacks are executed by malicious parties<br>(e.g., hackers) in real settings. For this purpose, we prepared a virtual machine that has a web<br>application that is connected to a database. This provides a safe environment to try and<br>experiment with such attacks. Recall to experiment with these attacks only in such safe and<br>isolated environments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Submission:<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"896\" height=\"516\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-4.png\" alt=\"\" class=\"wp-image-445\" srcset=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-4.png 896w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-4-300x173.png 300w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-4-768x442.png 768w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-4-521x300.png 521w\" sizes=\"(max-width: 896px) 100vw, 896px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"832\" height=\"917\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-5.png\" alt=\"\" class=\"wp-image-446\" srcset=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-5.png 832w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-5-272x300.png 272w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-5-768x846.png 768w\" sizes=\"(max-width: 832px) 100vw, 832px\" \/><\/figure>\n\n\n\n<p>The first script succeeds because the condition (&#8216;7&#8217;=&#8217;7&#8217;) always evaluates to true,<br>bypassing authentication.<br>\u2022 The second script fails because the condition (&#8216;7&#8217;=&#8217;8&#8217;) evaluates to false, making<br>the query invalid.<br>Why This Happens:<\/p>\n\n\n\n<p>The server is vulnerable to SQL injection due to improper input sanitization. It directly<br>incorporates user inputs into SQL queries without validating them or using prepared<br>statements. This allows attackers to manipulate the query logic.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"649\" height=\"721\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-6.png\" alt=\"\" class=\"wp-image-448\" srcset=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-6.png 649w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-6-270x300.png 270w\" sizes=\"(max-width: 649px) 100vw, 649px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"502\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-7-502x1024.png\" alt=\"\" class=\"wp-image-449\" srcset=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-7-502x1024.png 502w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-7-147x300.png 147w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-7.png 664w\" sizes=\"(max-width: 502px) 100vw, 502px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"566\" height=\"671\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-8.png\" alt=\"\" class=\"wp-image-450\" srcset=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-8.png 566w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-8-253x300.png 253w\" sizes=\"(max-width: 566px) 100vw, 566px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"439\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-9-439x1024.png\" alt=\"\" class=\"wp-image-451\" srcset=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-9-439x1024.png 439w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-9-129x300.png 129w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-9.png 549w\" sizes=\"(max-width: 439px) 100vw, 439px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"852\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-10-1024x852.png\" alt=\"\" class=\"wp-image-452\" srcset=\"https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-10-1024x852.png 1024w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-10-300x250.png 300w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-10-768x639.png 768w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-10-361x300.png 361w, https:\/\/sites.wp.odu.edu\/jb23435\/wp-content\/uploads\/sites\/30235\/2025\/04\/image-10.png 1054w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The objective of the project is to provide hands-on experience on web security as well as SQLinjection attack. We also want to show how such attacks are executed by malicious parties(e.g., hackers) in real settings. For this purpose, we prepared a virtual machine that has a webapplication that is connected to a database. This provides&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/sql-injection-attacks\/\">Read More<\/a><\/div>\n","protected":false},"author":24719,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/431"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/users\/24719"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/comments?post=431"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/431\/revisions"}],"predecessor-version":[{"id":453,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/431\/revisions\/453"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/media?parent=431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}