Question: SQL Manipulation: A manipulation attack, which is the most common type of injection attack, changes an SQL command in the application for example, by adding
SQL Manipulation: A manipulation attack, which is the most common type of injection attack, changes an SQL command in the applicationfor example, by adding conditions to the WHEREclause of a query, or by expanding a query with additional query components using set operations such as UNION, INTERSECT, or MINUS. Other types of manipulation attacks are also possible. A typical manipulation attack occurs during database login For example, suppose that a simplistic authentication procedure issues the following query and checks to see if any rows were returned:
SELECT FROM users WHERE username 'jake and PASSWORD jakespasswd ;
Now, assume that the following SQL statement is executed where Jane Doe a user manipulates the SQL statement as follows eg via a web form or external view:
SELECT FROM users WHERE username jake and PASSWORD jakespasswd or xx ;
If Jane Doe know that 'jake' is a valid login of some user who is able to log into the database system as 'jake' without knowing his password, do you think that Jane Doe might be able to do everything that 'jake' may be authorized to do to the database system in this case
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
