Post-Image

SQL Injection

Project:

Demonstrating SQL injection attacks and Ways to prevent them

Description:

Any user input(say login credentials) used while querying the database can have malicious sql queries within them. If not checked for these, attackers could potentially retrieve confidential data/perform unauthorised edits to the db. A way to prevent it is by looking for sql patterns/queries within the user input. We are building an application to demonstrate such attacks and methods to prevent them.