Oops! This image does not follow our content guidelines. To continue publishing, please remove it or upload a different image.
Until now, SQL injection is still a favorite technique used by hackers to hack web or applications. This is because basically, the way SQL injection works is quite simple, namely by abusing security holes at the database layer.
SQL injection can occur due to a security vulnerability. This gap was formed because the developers did not activate the filter for meta characters on the input form in the application, so that hackers could finally use it to write SQL commands in the login/input form.
In short, this technique is executed through the username form. The username form should only be filled in using characters, but the form can be filled with other characters. That way, hackers can embed SQL control characters such as (:;-,=') and command keywords that can damage the database structure. As a result, the hacker was able to enter SQL injectionqueries and the website was successfully hacked.