Common Cyber Attacks: Password attack & SQL injection attack

Ivery Daniels III
2 min readMay 9, 2021

Gaining passwords would be a commonly utilized attack approach since passwords are perhaps the most widely used way to authenticate a user to a data system. Looking behind a person’s monitor, sniffing that network link to retrieve unencrypted passwords, employing social engineering, and getting entry to a password archive can all be used to gain admission to an individual’s password.

Brute Force Attacks: Password Protection | Kaspersky

One type is Brute-force password randomization which entails using a spontaneous strategy by attempting various passwords and ensuring that one of them works. Using logic, attempt passwords linked to the person’s name, work description, hobbies, or similar things. Then there is a dictionary attack which attempts to obtain control to a person’s device and network by using a dictionary of different passwords. One method is to duplicate an encrypted file containing the passwords, then implement the same encryption to both a dictionary of frequently known passwords and examine the effectiveness. To shield oneself of dictionary or brute-force attacks, set up an account locking policy that locks the account within a few failed login attempts.

SQL injection is a general problem for database-driven websites. It happens when a deceiver performs a SQL query toward the database using the client-server input data. In order to execute predetermined SQL commands, SQL commands are injected into user input; possible example: rather than the login or password. A effective SQL injection attack can access critical data in a database, alter database data (insert, edit, or delete), perform database management functions like a shutdown, retrieve the value of a file type, and, in some cases, provide commands towards the OS.

Being aware of Malicious Data Corruption as a Data Scientist (SQL Injection Attack) | by Abhinay Dommalapati | Towards Data Science

The reality that SQL makes no difference between both the control and data planes makes it vulnerable to this kind of cyber security attack. SQL injections are more effective where a website contains dynamic SQL. Due to the rise of outdated functional interfaces, SQL injection is very popular in the likes of PHP applications as well as ASP. Along with the design of the universally available, J2EE and ASP.NET implementations become less probable to be readily abused SQL injections.

--

--