Web and Network Hacking
Dr. M.A.Srinuvasu
Associate Professor
SQL injection
If the input fields are not sanitized properly, then the malicious user can enter some data like this
Username = blah’ or 1=1—
Password = password
Here both username and password are incorrect. But the query which is constructed will be
The query will run and the user will be granted access. This is because the first part of the query is
Because – is a comment line in SQL, everything following that will be ignored. The query will only validate between username=’blah’ or 1=1.
Because 1=1 is always true, the user will be granted access.
Types of SQL Injection
Error based Injection
Union Based SQL injection
Blind SQL injection
Hacking Wireless Networking
Open Authentication
Shared Key Authentication Process
Centralised Authentication
Encryption Types
WEP: Wired Equivalent Privacy
WAP: Wi-Fi Protected Access
WPA2: Wi-Fi Protected Access with FAD
Virus
Different types of Viruses:
Worms