Sunday, March 14, 2010

SQL Injection and Hacking Web Sites

Vandals, who know how to hack, most often use hacking methods for the purpose of defacing a website or ruin the entire data and files while the other section cracks through the websites simply to steal substance. While the former brings severe harm to the victim, the cyber burglars do not do much harm.

There is a load of devastating tools that the web hackers use to vandalize just anything and everything they want to. One of the most popular weapons or method that can bring immense harm is SQL Injection. SQL - the short form of Structured Query Language is a special type of language that is used when a web application uses a database communicating with the other database for some required function.

With the help of the SQL command issued to a database server, the web application can cast a deep impact to all the aspects of the database allowing the hackers to edit, add, and delete information there from. SQL has been designed for the legitimate purpose while it has now become a deadly weapon in the hand of the web hackers intended for hacking sites. The web hackers can inject SQL command and may perform any operation as per his or her own sweet will.
Rate this Article

Cross Site Scripting

Another more dangerous technique is Cross Site Scripting, which is also defined by XSS. This is a stronger weapon that brings out much more devastation. Cross Site Scripting or XSS is a devastating technique that facilitates the hackers to inject the malicious scripting code in the form of _JavaScript in the user input form or sometimes incorporated in the URL query string. Cross Site Scripting can virtually do any task such as recording the keystrokes and stealing cookies once it is injected into the targeted browser of the end user.

Distributed Denial of Service

Denial of Service attack or Distributed Denial of Service i.e. DOS or DDOS is the attacking technique that is used by the hackers who wants to overload any remote system with a repeated and enormously large volume of requests for any specified service. The most interesting fact about the DDOS is that it can attack a several thousands of distinctive users in such a fashion that the script fails to detect whether the requests are legitimate or illegitimate. Though it is quite tough to prevent Dos attack, yet successful efforts have been made in this regard by checking out the IP address hacking of the source of the requests.

There are innumerable of such tactical techniques in the hands of the web hackers for hacking into websites. These tools have made the website hacking so easy that it has become fun for the cyber terrorists. The first step of hacking web sites is simply to detect the feeble and less secured portion of the system.

No comments:

Post a Comment