Vous êtes sur la page 1sur 1

Q1 2015 STATE OF THE INTERNET SECURITY REPORT

WEB APPLICATION SECURITY

SQL INJECTION
ATTACKS
A

WHAT
THEY DO

HOW IT
HAPPENS

Web applications use databases

Cyber-attackers want to steal


data from your databases

SQL injection attacks identify


and steal data from poorly-coded
web applications
Attackers use your web application
build SQL statements

Credential theft
Probing and reconnaissance
Database content retrieval
Website defacement
Login privilege escalation
Data corruption
Remote command execution
Denial of service
Data and file exfiltration
Business logic subversion

AKAMAI TO
THE RESCUE

Akamais Web Application


Firewall stops SQL injection attacks
The Numbers*

7 days
2,000 web applications
8 million SQL injection payloads
* Data from Akamais Kona Site Defender web
application firewall (WAF)

3 COMMON SQL ATTACKS


SQL Injection 59.6%
Locate entry points
Probe for vulnerabilities

Environmental Probing 15.5%


Tries to learn system info
Tries to learn database structure

Access the complete


Q1 2015 State of the Internet Security Report at
www.stateoftheinternet.com/security-report

Statistics based on attack campaigns mitigated by Akamai

Credential Theft 23.2%

Access user tables


Steal user names & passwords

Vous aimerez peut-être aussi