1 00:00:03,850 --> 00:00:10,350 Hello and welcome to this video and this video, we are going to see a security breakdown along with 2 00:00:10,360 --> 00:00:11,970 a query breakdown. 3 00:00:11,980 --> 00:00:17,100 We are going to see how to bypass or how to perform a injection. 4 00:00:17,560 --> 00:00:25,030 The logic is going to be clear in this video, how to an attacker perform a skill injection on to any 5 00:00:25,030 --> 00:00:26,690 particular application. 6 00:00:27,220 --> 00:00:29,620 So let's try to understand this committee. 7 00:00:29,950 --> 00:00:37,210 Select staff from student, where you are the school name equal to admin and you underscore plus equals 8 00:00:37,210 --> 00:00:39,670 uman or one equals one. 9 00:00:39,680 --> 00:00:43,630 So I would recommend neglect this part for now. 10 00:00:43,960 --> 00:00:47,080 Try to understand this much of query this. 11 00:00:47,080 --> 00:00:52,480 I am repeating this query again and again in all my videos. 12 00:00:52,750 --> 00:00:59,200 So this gladis means select all the details from student table. 13 00:00:59,350 --> 00:01:08,530 When you underscore name column equals admin and you underscore password column equals human. 14 00:01:08,860 --> 00:01:16,480 That means filter out all the details from the student table, whose username is admin and password 15 00:01:16,480 --> 00:01:17,200 is human. 16 00:01:19,090 --> 00:01:25,270 While the square is executing, it will take for the following details into the column, username and 17 00:01:25,270 --> 00:01:26,380 password if. 18 00:01:27,530 --> 00:01:37,400 The user name column has admin as a user and human as a password, if both the conditions are satisfied, 19 00:01:37,400 --> 00:01:45,050 then the query is going to give us the output is true and is going to allow the user to enter into the 20 00:01:45,050 --> 00:01:45,970 application. 21 00:01:45,980 --> 00:01:53,180 Otherwise, it will not allow, as we have seen from the table, that and will only allow the user to 22 00:01:53,180 --> 00:01:59,000 enter into the application if both the conditions are satisfied. 23 00:01:59,030 --> 00:02:04,070 Otherwise it will not allow the user to enter into the application. 24 00:02:05,940 --> 00:02:13,740 So being an attacker, what an attacker does is if he or she doesn't know the password, so at the place 25 00:02:13,740 --> 00:02:21,660 of password, the attacker is going to put this as a payload uman single code or one equals one. 26 00:02:21,690 --> 00:02:23,020 What does this mean? 27 00:02:23,250 --> 00:02:25,720 Let's break down this query to further. 28 00:02:26,470 --> 00:02:33,450 OK, so the user name is admin and password, which the attacker is passing is human. 29 00:02:33,660 --> 00:02:40,080 But according to the student database, there is no such user as well as there is no such password into 30 00:02:40,080 --> 00:02:40,770 the table. 31 00:02:41,370 --> 00:02:50,980 So username geeves false and password also gives false, but take the place of password and to the input 32 00:02:50,980 --> 00:02:51,360 field. 33 00:02:51,360 --> 00:02:57,780 The attacker has inserted something else as well, which is all one equals one. 34 00:02:58,260 --> 00:03:07,620 So all will behave as a logical operator into the query and then it is going to perform something which 35 00:03:07,620 --> 00:03:08,370 is true. 36 00:03:08,640 --> 00:03:14,290 One is always equal to one and it is always going to give you the result as true. 37 00:03:14,610 --> 00:03:19,050 So this query will now become false and false. 38 00:03:19,050 --> 00:03:21,690 False and false becomes false. 39 00:03:22,470 --> 00:03:26,320 False or true becomes true according to the true table. 40 00:03:26,340 --> 00:03:33,470 So this is how the attacker gets into the application without knowing the correct details of the user. 41 00:03:33,870 --> 00:03:37,410 We are going to see this practically into the next video. 42 00:03:37,420 --> 00:03:40,540 So no need to worry if you didn't understood the whole thing. 43 00:03:40,920 --> 00:03:42,060 Thank you so much.