SQL Injection Attacks | Week 3

I have been reading through a bunch of different articles about SQL injection attacks and have found some similarities. I read these articles from cNet and other various hits received from Google search engine. The first similarity I will note is the time of these attacks seem to be around 2012 and all of these attacks are from non-validated user input. It seems to me that there were just a lot of website owners and designers at the time that were not aware of the importance of user input validation around 2012. That brings me to the second similarity, user validation. That seems to be the only breach problem, if all user inputs are validated then there would be no such think as SQL injection attacks. I guess that there could be a way of manipulating stored procedures but without the leak through user input I have no idea how attackers would implement these attacks.

This post was written by: Martin Hand


If you find this information helpful please consider a donation. These articles, questions and comments are very time consuming so even a small donation gives me motivation to keep educating automotive owners. Donations will allow us to continue open questioning/comments, automotive education and repair tutorials in the future as the business grows. All proceeds go to the expansion and maintenance mdhmotors.com. Thank You

MDH Motors logo

About Martin Hand

ASE Certified L1 Advanced Mastertech. Martin Hand has over 15 years experience in Asian and European Import Auto Repair. Specializing in electrical diagnosis, engine performance, AT/MT transmission repair/rebuild. Martin is also pursuing a degree in Computers Science & Information Systems starting at Portland Community College while he plans to transfer to OIT. Certified in Java application level programming, experienced with other languages such as PHP, Ruby, JavaScript and Swift. Martin has future plans of automotive diagnostic software development.