“SQL Injection: What It Is, How It Works, and How You Can Prevent It”

Yusuf Naeem (ws0x)
5 min readOct 12, 2024

--

SQL Database

Imagine you’re running a shop, and someone walks in asking for some information about your products. But instead of asking nicely, they sneak around, pry into your back office, and steal your business records!
This, in a nutshell, is how SQL Injection works in the digital world — it sneaks in through open doors (your website’s forms, for instance) and digs deep into your database, all while you’re unaware. But don’t worry! By the time you finish this article, you’ll understand how to lock those doors securely.

What is SQL Injection?

At its core, SQL Injection (SQLi) is a technique used by attackers to inject malicious SQL code into a query, manipulating it to access, modify, or delete data from a database. Think of it as an attack that twists the database’s arm, forcing it to spill sensitive information. This could be user credentials, private customer data, or even admin-level access to the entire application.

Let’s say a website asks for your username and password. Normally, this input is passed to the database to check if the credentials are valid. But what if an attacker enters something unexpected? Like this:

Username: ' OR 1=1 - 
Password: [anything]s

What happens here is that the query becomes:

SELECT * FROM users WHERE username = '' OR 1=1 - AND password = '[anything]'

Notice the OR 1=1? That will always return true, allowing the attacker to bypass authentication and log in without a valid username or password. Sounds sneaky, right?

Types of SQL Injection

Let’s break down the different ways attackers can exploit SQL Injection:

1. Error-Based SQL Injection
This method relies on generating errors that leak information about the database. When attackers insert malicious code, they can intentionally trigger errors that return useful details — like table names or database structure. It’s like a burglar shaking a locked door until it reveals its weakness.

Example:

SELECT * FROM users WHERE id = 1' AND 1=CONVERT(int, (SELECT @@version)) -

This might reveal the database version and give the attacker more clues on how to proceed.

2. Union-Based SQL Injection
This is a sneaky technique where attackers use the SQL `UNION` operator to pull data from multiple tables in one go. The attacker can merge their malicious query with the legitimate one to steal additional data.

SELECT name, email FROM users WHERE id = 1 UNION SELECT username, password FROM admins -

Here, they’re trying to get usernames and passwords from the `admins` table, sneaking it into the original query result.

3. Blind SQL Injection
Blind SQL Injection is like guessing a secret code without seeing the lock. Attackers don’t get error messages to guide them, but they send true or false queries to learn more about the database. They ask questions like, “Is this true?” and use the response (or lack of one) to slowly piece together valuable information.

SELECT * FROM users WHERE id = 1 AND IF(1=1, 'true', 'false') -

If the page behaves differently, the attacker knows their assumption was correct.

4. Time-Based Blind SQL Injection
In this variation, attackers use time delays to infer information. If the response takes longer, they know their injected query worked. It’s like asking, “If I’m right, make me wait 5 seconds,” and timing how long the response takes.

SELECT * FROM users WHERE id = 1 AND IF(1=1, SLEEP(5), 'false') -

A delayed response confirms the attacker’s hypothesis.

How to Prevent SQL Injection

Now that we’ve pulled back the curtain on SQL Injection attacks, let’s talk defense. Preventing SQL Injection is easier than you might think, and with a few key practices, you can keep your web applications safe. Here’s what you need to know:

1. Use Prepared Statements (Parameterized Queries)
This is your first line of defense. Prepared statements ensure that user inputs are treated as data, not executable code. The database will never confuse data with part of the SQL query, keeping it safe from manipulation.

Example (PHP):

$stmt = $pdo->prepare('SELECT * FROM users WHERE username = :username');
$stmt->execute(['username' => $input_username]);

With prepared statements, the input is safely separated from the query itself.

2. Stored Procedures
Stored procedures are like pre-defined SQL functions that run on the database server. Since they are predefined, user input doesn’t directly alter the SQL logic, making it harder for an attacker to interfere.

Example (SQL Server):

CREATE PROCEDURE GetUser
@username nvarchar(50)
AS
BEGIN
SELECT * FROM users WHERE username = @username
END

3. Validate User Input
Always validate user input! If your web form expects an email address, don’t accept anything that doesn’t look like an email address. Sanitize all inputs to ensure no malicious data gets through.

4. Principle of Least Privilege
Never give your application more database access than it needs. If your app only needs to read data, don’t give it permission to write or delete. This minimizes damage if an attack does occur.

5. Use an ORM (Object-Relational Mapping)
ORM libraries are fantastic because they abstract database queries, allowing developers to interact with the database without writing raw SQL. This significantly reduces the chance of SQL injection vulnerabilities.

6. Implement a Web Application Firewall (WAF)
A WAF acts as a security guard at the gate of your application, filtering out malicious traffic before it even reaches your web server. It can recognize and block common SQL injection patterns.

7. Escape User Input Properly
If for some reason you must use dynamic SQL queries, ensure you properly escape user inputs. This will prevent attackers from injecting malicious SQL code into your queries

Conclusion

SQL Injection may sound like a hacker’s magic trick, but once you know the secrets behind it, you can lock your databases tight and prevent attackers from slipping in. The key takeaway? Always treat user input as un-trusted and take steps to separate it from your database queries. Whether it’s using prepared statements, validating input, or applying the principle of least privilege, you now have the tools to defend your web applications from SQL injection attacks. It’s time to close those open doors and keep your data safe!

--

--

Responses (1)