🎁 New User? Get 20% off your first purchase with code NEWUSER20 Register Now →
Menu

Categories

Security Beginner

What is SQL Injection?

An attack where malicious SQL code is inserted into application queries through user input to access or manipulate the database.

SQL injection occurs when user input is directly concatenated into SQL queries without sanitization. An attacker might enter ' OR 1=1 -- as a username, bypassing authentication or extracting data.

Prevention methods include parameterized queries (prepared statements), input validation, least-privilege database accounts, and ORM usage. SQL injection remains one of the OWASP Top 10 vulnerabilities and can lead to complete database compromise.

Related Terms

RBAC (Role-Based Access Control)
An access control model where permissions are assigned to roles, and users are assigned to roles rather than getting permissions directly.
Webhook Signature Verification
A security mechanism that verifies webhook payloads are authentic and unmodified using cryptographic signatures.
WAF (Web Application Firewall)
A security solution that filters and monitors HTTP traffic between a web application and the internet, blocking common attacks.
Firewall Rules
Configuration entries that define which network traffic is allowed or blocked based on source, destination, port, and protocol.
DDoS (Distributed Denial of Service)
An attack that floods a target server or network with traffic from multiple sources to overwhelm it and deny service to legitimate users.
Brute Force Attack
An attack method that systematically tries all possible combinations of passwords or keys until the correct one is found.
View All Security Terms →