How I found SQL Injection to Bypass Authentication — androx47

Pintu Solanki
3 min readMar 10, 2021
Using SQL Injection to Bypass Authentication

What is SQL Injection?

The SQL injection is a code injection technique where you can include some malicious content in SQL statements. For this kind of attacks mostly using web inputs as an entry point and overcome security controls in a system.

I hope you are fine and healthy during these hard time and I was testing a Responsible disclosure program, then at the time of testing, When I entered the query(‘ or 1=1 — ) of SQL auth bypass in the login forum and the account was logged in at the same time.

Like below you can see the screen shot of burp suit tool.👇👇

This is the website’s log-in form at the bottom.👇👇

How SQL Injection Works?

When you enter your login credentials in a Login page like following Ultimately it will execute a table lookup in your database in order to check whether you are a valid user or not. For that, you have to use a SQL query to check whether the provided data is existing in the database. Below SQL query is one of the basic query to check if the user exists in the database for given username and password (Hope you have a basic understanding of SQL.

Using SQL Injection to Bypass Authentication

What is a Web injection attack?

In an injection attack, an attacker supplies untrusted input to a program. This input gets processed by an interpreter as part of a command or query. … This attack type is considered a major problem in web security. It is listed as the number one web application security risk in the OWASP Top 10 — and for a good reason.

What is the impact of SQL injection vulnerabilities?

The impact SQL injection can have on a business is far-reaching. A successful attack may result in the unauthorized viewing of user lists, the deletion of entire tables and, in certain cases, the attacker gaining administrative rights to a database, all of which are highly detrimental to a business.

Why would a hacker use SQL injection?

SQL injection attacks are the workhorses of hacking incidents, tricking web sites into spilling credit card numbers and other sensitive data to hackers. … The attacks exploit a vulnerability or vulnerabilities in web applications that communicate with backend servers where the databases are stored.

Is SQL injection still a threat?

He harvested them all using SQL injection techniques, in an operation that compromised many companies and millions of their customers. As an industry, we are improving all the time, but SQL injection is still a significant threat and affects far more than just legacy or unpatched systems.

What is injection flaw?

Injection flaws allow attackers to relay malicious code through an application to another system. These attacks include calls to the operating system via system calls, the use of external programs via shell commands, as well as calls to backend databases via SQL (i.e., SQL injection

Why is SQL injection dangerous?

SQL injection attacks pose a serious security threat to organization’s. A successful SQL injection attack can result in confidential data being deleted, lost or stolen; websites being defaced; unauthorized access to systems or accounts and, ultimately, compromise of individual machines or entire networks.

Thank You For Reading……

--

--

Pintu Solanki

With the new day comes new strength and new thoughts.