Roll your eyes if you want, but even though SQL injection has been around for more than 10 years, this vulnerability is still one of the most rampant. So, why is that? With the advent of automated tools to detect vulnerabilities, most people assume SQL injections are either extinct or so hard to find that they are not worth an attacker’s time. This talk will reveal how a SQL injection that might be missed by an automated tool can easily be found by a manual process, and demonstrate how a single input in a simple Web application can expose an entire database. Specifically, this session will explore:<ul> <li>Why SQL injection still exists</li> <li>Challenges around individual databases and Web applications</li> <li>SQL injection goes both ways: in and out of the database<ul> <li>Extraction of data from a backend database</li> <li>Injection of content including malware</li></ul></li> <li>Live demos: <ul> <li>Verbose SQL Injection</li> <li>Blind SQL Injection</li> <li>Simple manual checks for SQL Injection that evades automated tools – and how attackers are using them</li></ul></li> <li>Validating the inputs and self defense</li> <li>What tools can be used to test applications</li> <li>Case studies of recent infections and exploits</li></ul>