How an attacker could get your database using SQL Injection vulnerability (real demo of a hacker attack)

How an attacker could get your database using SQL Injection vulnerability (real demo of a hacker attack)

In recent blog we have shown you how an attacker could gain administrator’s access via Cross Site Scripting (XSS) vulnerability. Now we want to show you how an attacker could abuse even more common and more dangerous vulnerability called SQL Injection. It’s main cause is similar – the developer does not sanitize inputs. But this time it’s about inputs getting passed directly to SQL query.

We will demonstrate a real hacker attack that leads to gaining all the data in the database, including credit card information stored in the web store.

About the author

Citadelo
Citadelo
Citadelo is a firm of ethical hackers on your side. We think like hackers, but we don't abuse it. On the contrary, our main goal is to reveal vulnerabilities without causing damage. We have been conducting simulated attacks for our clients since 2006
Show more from author

Related blogs