The innocuous credential SQL search SELECT userid FROM members WHERE
username = 'admin' AND password='DifficultPassword!' is modified by
the attacker by entering admin'-- in the unprotected login field above
to produce the following SQL code behind the scenes: SELECT userid
FROM members WHERE username = 'admin' AND password='123' admin is the
user we want to impersonate ' is used to terminate the literal string
in the SQL statement -- means "comment out the rest of the line"
making sure that password validation is not performed. '-- is the
simplest SQL injection, there are many different ways to perform SQL-
injection (beginners cheat sheet are available on the internet12) and
even more ways to bypass SQL Injection protections (called filter
evasion13). SQL Injection can do more than just bypass login
restrictions, SQL Injections can:
- Launch malicious SQL commands like "DROP Tables"
- OS Commands like "Format c:"
- Download and execute Trojan horses on your server
-
Execute complex queries returning the creditcard data in your
database to the attacker