Professional Documents
Culture Documents
SQLinjections
SQLinjections
FACT -- SQL injection was first discovered in 1998 but still it’s among the TOP 10 OWASP
vulnerability List (OWASP – Open Web Application Security Project)
Source - indusface.com
3. Once a hacker gains control, he can steal, edit, delete sensitive data or exploit other
admin rights
Team –
SANKET KUMAR (22MCA0143)
MOHIT KUMAR (22MCA0170)
ABHILASH DUTTA (22MCA0210)
Prerequisite –
Study of the Top Research papers and the Review
papers on the SQL injections and its prevention
techniques.
Tentative Content –
Study about DBMS and SQL language
Brief Note on SQL injections, its types and its Attacks
A Case Study example
Its effect on Organisations and its users
Its effect in the field of cyber security and projects
Brief study on the different ways to foil SQL injections
New ways to tackle the injection Attacks