Open Access Open Access  Restricted Access Subscription Access

SQL Injection: Attacking & Prevention Techniques


 

This article speaks about the improvement in the development process of the application to avoid the SQLIA attack at the preliminary level, especially at the source code itself. We discuss about the possible methods to attack an SQLIA providing the pseudo code for better understanding. A prototype of the solution ie consolidating the validation into a single custom component termed as Injection Box control (IBC) that takes care of all the possible preventive measures for controlling the SQLIA at the source code level itself.


Keywords

SQLIA, IBC, Net Sparker, MSSQL, Vulnerable
User
Notifications
Font Size

Abstract Views: 127

PDF Views: 1




  • SQL Injection: Attacking & Prevention Techniques

Abstract Views: 127  |  PDF Views: 1

Authors

Abstract


This article speaks about the improvement in the development process of the application to avoid the SQLIA attack at the preliminary level, especially at the source code itself. We discuss about the possible methods to attack an SQLIA providing the pseudo code for better understanding. A prototype of the solution ie consolidating the validation into a single custom component termed as Injection Box control (IBC) that takes care of all the possible preventive measures for controlling the SQLIA at the source code level itself.


Keywords


SQLIA, IBC, Net Sparker, MSSQL, Vulnerable