The SQL commands consist of statements that, when executed, are going to interact with a system’s database. The paper SQL Injection Attacks: Detection in a Web Application Environment, published by DB Networks, gives a thorough explanation on …show more content…
The websites attacked were from NASA’s Instrument Systems and Technology Division and its Software Engineering Division. Gunter Ollmann, Vice-President of Research at Security Company Damballa, stated that the attacker went by the alias “c0de.breaker” and exploited NASA’s poorly secured access controls in order to execute his/her SQL injection (Hacker Uses SQL Injection, 2009). The SQL injection attack revealed 25 administrator’s credentials and the attacker was able to alter web content on NASA’s websites (Moscaritolo, …show more content…
In most cases, there is no justifiable reason to allow so many characters to be entered into a website’s forum. To prevent possible SQL injections, there should be a limitation on how many characters can be entered into a forum (McDonald, pg. 23). As stated previously, there was no specific code published that was used by c0de.breaker to obtain administrator privileges. To provide an example, assume that one of c0de.breaker’s code displayed data about several tables. The following code, for a MySQL server, would display table names by accessing the information_schema.tables: “1 AND 1=2 UNION SELECT table_schema, table_name, 1 FROM information_schema.tables” (Find Table Names, n.d). The total amount of characters, including spaces, in the previously mentioned code is eighty-one. Limiting the characters that can be entered into a forum can prevent SQL injection attacks from becoming complete