{"id":371,"date":"2022-10-13T11:35:13","date_gmt":"2022-10-13T11:35:13","guid":{"rendered":"https:\/\/cwatch.comodo.com\/blog\/?p=371"},"modified":"2022-10-13T12:58:05","modified_gmt":"2022-10-13T12:58:05","slug":"what-is-an-sql-injection-sqli","status":"publish","type":"post","link":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/","title":{"rendered":"What is SQL Injection (SQLI)?"},"content":{"rendered":"<br \/>\n<h2>What is SQL Injection Attack?<\/h2>\n<p><strong>SQL Injection (SQLI)<\/strong> is a backend database method used by hackers to take control of a web application by injecting malicious SQL codes. SQLI attacks are becoming very widespread because they are easy to do and require very little technical knowledge to perform. SQLI is a web application server issue that most developers are unaware of.<\/p>\n<h2>SQL Injection Types:<\/h2>\n<p>Hackers insert malicious SQL codes using different methods which include retrieving data in <a href=\"https:\/\/www.formbot.com\/\" rel=\"noopener\" target=\"_blank\">form<\/a> of errors, conditions, and time. Let\u00e2\u20ac\u2122s take a detailed look at the SQL Injection types:<\/p>\n<div itemtype=\"https:\/\/schema.org\/ItemList\">\n<ol itemprop=\"itemListOrder\" href=\"https:\/\/schema.org\/ItemListOrderAscending\">\n<meta itemprop=\"numberOfItems\" content=\"3\" \/><\/p>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"1\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Error Based SQL Injection<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"2\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">SQL Injection Based on Boolean Errors<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"3\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">SQL Injection is done through Time Based Query<\/li>\n<\/div>\n<\/div>\n<\/ol>\n<\/div>\n<h3><strong>1. Error Based SQL Injection:<\/strong><\/h3>\n<p>In this method hackers can easily fetch details such as table names and content from visible database errors and this could be identified easily by hackers on the production servers. The best method here is to avoid displaying database error messages which in turn prevents hackers from fetching that information.<\/p>\n<h3><strong>2. SQL Injection Based on Boolean Errors:<\/strong><\/h3>\n<p>In a few cases, the error message is not displayed on a page when an SQL Query fails which makes it difficult for the hackers to gain entry into the vulnerable application. But there is still a way for hackers to find information. Whenever an SQL query fails some parts of the webpage seem to disappear or the whole website will fail to load.<\/p>\n<div itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n<meta itemprop=\"name\" content=\"SQL Injection Types\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/sql-injection.png\" class=\"img-responsive\" alt=\"SQL Injection Types\" itemprop=\"contentUrl\" \/><br \/>\n<meta itemprop=\"datePublished\" content=\"2022-10-14\"><br \/>\n<meta itemprop=\"description\" content=\"What is SQL Injection? SQL Injection (SQLI) attack helps hackers to inject malicious SQL queries into an application database to hack data. Get cWatch Now!\">\n<\/div>\n<p>On confirmation of these notifications the hacker inserts a false condition into the SQL query to test the vulnerability level of the application and the proximity of data extraction.<\/p>\n<p><strong>Example:<\/strong><br \/>\n<strong>https:\/\/xyz.com\/index.php?id=1+AND+1=1<\/strong><\/p>\n<p>After inserting this query if the website loads normally then it indicates that it is vulnerable to an <strong><a href=\"https:\/\/cwatch.comodo.com\/ddos-attack-protection\/best-sql-injection.php\">SQL injection<\/a><\/strong>. To confirm this suspicion, the hacker would put a wrong query:<\/p>\n<p><strong>https:\/\/xyz.com\/index.php?id=1+AND+1=2<\/strong><\/p>\n<p>As this condition is false and if the webpage does not work as usual it shows that the webpage is vulnerable to SQL Injection attack.<\/p>\n<h3><strong>3. SQL Injection is done through Time Based Query:<\/strong><\/h3>\n<p>In many cases, the Vulnerable SQL queries would be displayed visually on a web page but can be still easy to find out. Hackers here instruct the database to wait for a certain period before responding. If the site denies this and loads without any pause it means that they are not vulnerable. The SQL query implemented here would be similar to Boolean Attack but would have a sleep function in the query. For example, if the sleep time is 5 seconds then it instructs the database to sleep for 5 seconds.<\/p>\n<p><strong>Example Query:<\/strong><br \/>\nhttps:\/\/xya.com\/index.php?id=1+AND+IF(version()+LIKE+\u00e2\u20ac\u21228%\u00e2\u20ac\u2122,sleep(5),false)<\/p>\n<h2>Methods to Prevent SQL Query:<\/h2>\n<p>False SQL queries entry can be avoided by<\/p>\n<p>Locating these&nbsp; SQL queries in a manual aspect would prove to be costly as there are chances of missing out. Hence, getting <a href=\"https:\/\/cwatch.comodo.com\/best-website-security-for-enterprise.php\">website security software<\/a> is a good step.<\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/cwatch-plans.php?product_plan=pro&amp;track=10110\u00c2\u00a4cy&amp;af=10110\" onclick=\"ga('send', 'event', { eventCategory: 'Cwatch Blog', eventAction: 'Click', eventLabel: 'Get Now!'});ga('nT.send', 'event', { eventCategory: 'Cwatch Blog', eventAction: 'Click', eventLabel: 'Get Now'});\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" alt=\"website-security\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/cwatch-pro-new.png\"><\/a><\/p>\n<p>Implementing <a href=\"https:\/\/cwatch.comodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">web security<\/a> software helps to validate this issue by having a thorough check on each and every query. Even if a vulnerable query is found it makes sure that the web page is loading properly by hiding the queries from the database.<\/p>\n<ul>\n<li>replacing special characters such as ( &#8220;&#8221;, &#8220;%&#8221;, &#8220;\\&#8221;, &#8220;_&#8221;, &#8220;#&#8221;).<\/li>\n<li>Stored procedures being used up in a database<\/li>\n<li>Use of prepaid statements in queries.<\/li>\n<\/ul>\n<p><a class=\"get_started_cta\" href=\"https:\/\/cwatch.comodo.com\/free-malware-removal-form.php?af =9679\" target=\"_blank\" onclick=\"ga('send', 'event', { eventCategory: 'Cwatch Blog', eventAction: 'Click', eventLabel: 'What is an SQL Injection (SQLI)'});ga('nT.send', 'event', { eventCategory: 'Cwatch Blog', eventAction: 'Click', eventLabel: 'What is an SQL Injection (SQLI)'});\" rel=\"noopener noreferrer\"><img decoding=\"async\" alt=\"website-security\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/cwatch-website-security.jpg\"><\/a><\/p>\n<p><strong>Related Resource<\/strong><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/cheap-cdn\/?product_plan=pro&amp;track=10110\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Cheapest CDN Service<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/best-cdn\/?product_plan=pro&amp;track=10110\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Best CDN Service<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/pay-as-you-go-cdn\/?product_plan=pro&amp;track=10110\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Pay as You Go CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/cdn\/?product_plan=pro&amp;track=10110\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/free-cdn\/?product_plan=pro&amp;track=10110\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Free CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/blog\/hosting\/free-web-hosting\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Free Website Hosting<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Website Malware Scanner<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/vulnerability-found-in-multiple-stored-xss-form-in-wordpress-version-1-2-5\"><strong>Vulnerability found in multiple stored xss form in wordpress version 1 2 5<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/how-to-check-if-your-site-is-blacklisted\/\"><strong>How to Check if Your Site is Blacklisted<\/strong><\/a><\/p>\n<p><b><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/wordpress-security.php\">WordPress Security<\/a><\/p>\n<p><\/b><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" target=\"_blank\" rel=\"noopener noreferrer\">Website Status<\/a><\/p>\n<p><b><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener noreferrer\" target=\"_blank\">Website Backup<\/a><\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is SQL Injection Attack? SQL Injection (SQLI) is a backend database method used by hackers to take control of a web application by injecting malicious SQL codes. SQLI attacks are becoming very widespread because they are easy to do and require very little technical knowledge to perform. SQLI is a web application server issue [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4561,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[1272,1292,1282,1262],"class_list":["post-371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security","tag-prevent-sql-injection-attacks","tag-sql-query","tag-sqli-types","tag-what-is-sql-injection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is SQL Injection? | Prevent SQLI Attacks | SQLI Types<\/title>\n<meta name=\"description\" content=\"SQL Injection - A database method used by hackers to control web apps. SQL Injection is an attack that allows an attacker to run SQL code.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is SQL Injection? | Prevent SQLI Attacks | SQLI Types\" \/>\n<meta property=\"og:description\" content=\"SQL Injection - A database method used by hackers to control web apps. SQL Injection is an attack that allows an attacker to run SQL code.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/\" \/>\n<meta property=\"og:site_name\" content=\"cWatch Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-13T11:35:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-13T12:58:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/07\/what-is-sql-injection.png\" \/>\n\t<meta property=\"og:image:width\" content=\"751\" \/>\n\t<meta property=\"og:image:height\" content=\"351\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seoindia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\"},\"headline\":\"What is SQL Injection (SQLI)?\",\"datePublished\":\"2022-10-13T11:35:13+00:00\",\"dateModified\":\"2022-10-13T12:58:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/\"},\"wordCount\":604,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/07\/what-is-sql-injection.png\",\"keywords\":[\"prevent sql injection attacks\",\"SQL Query\",\"SQLI Types\",\"What is SQL Injection\"],\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/\",\"name\":\"What is SQL Injection? | Prevent SQLI Attacks | SQLI Types\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/07\/what-is-sql-injection.png\",\"datePublished\":\"2022-10-13T11:35:13+00:00\",\"dateModified\":\"2022-10-13T12:58:05+00:00\",\"description\":\"SQL Injection - A database method used by hackers to control web apps. SQL Injection is an attack that allows an attacker to run SQL code.\",\"breadcrumb\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/07\/what-is-sql-injection.png\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/07\/what-is-sql-injection.png\",\"width\":751,\"height\":351,\"caption\":\"What is SQL Injection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cwatch.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is SQL Injection (SQLI)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"name\":\"cWatch Blog\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\",\"name\":\"cWatch Blog\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"width\":106,\"height\":52,\"caption\":\"cWatch Blog\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\/\/x.com\/seoindia\"],\"url\":\"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is SQL Injection? | Prevent SQLI Attacks | SQLI Types","description":"SQL Injection - A database method used by hackers to control web apps. SQL Injection is an attack that allows an attacker to run SQL code.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/","og_locale":"en_US","og_type":"article","og_title":"What is SQL Injection? | Prevent SQLI Attacks | SQLI Types","og_description":"SQL Injection - A database method used by hackers to control web apps. SQL Injection is an attack that allows an attacker to run SQL code.","og_url":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/","og_site_name":"cWatch Blog","article_published_time":"2022-10-13T11:35:13+00:00","article_modified_time":"2022-10-13T12:58:05+00:00","og_image":[{"width":751,"height":351,"url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/07\/what-is-sql-injection.png","type":"image\/png"}],"author":"Admin","twitter_card":"summary_large_image","twitter_creator":"@seoindia","twitter_misc":{"Written by":"Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#article","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/"},"author":{"name":"Admin","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d"},"headline":"What is SQL Injection (SQLI)?","datePublished":"2022-10-13T11:35:13+00:00","dateModified":"2022-10-13T12:58:05+00:00","mainEntityOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/"},"wordCount":604,"commentCount":0,"publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/07\/what-is-sql-injection.png","keywords":["prevent sql injection attacks","SQL Query","SQLI Types","What is SQL Injection"],"articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/","url":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/","name":"What is SQL Injection? | Prevent SQLI Attacks | SQLI Types","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/07\/what-is-sql-injection.png","datePublished":"2022-10-13T11:35:13+00:00","dateModified":"2022-10-13T12:58:05+00:00","description":"SQL Injection - A database method used by hackers to control web apps. SQL Injection is an attack that allows an attacker to run SQL code.","breadcrumb":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#primaryimage","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/07\/what-is-sql-injection.png","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/07\/what-is-sql-injection.png","width":751,"height":351,"caption":"What is SQL Injection"},{"@type":"BreadcrumbList","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/what-is-an-sql-injection-sqli\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwatch.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is SQL Injection (SQLI)?"}]},{"@type":"WebSite","@id":"https:\/\/cwatch.comodo.com\/blog\/#website","url":"https:\/\/cwatch.comodo.com\/blog\/","name":"cWatch Blog","description":"Just another WordPress site","publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cwatch.comodo.com\/blog\/#organization","name":"cWatch Blog","url":"https:\/\/cwatch.comodo.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","width":106,"height":52,"caption":"cWatch Blog"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","caption":"Admin"},"sameAs":["https:\/\/x.com\/seoindia"],"url":"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/"}]}},"_links":{"self":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=371"}],"version-history":[{"count":23,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/371\/revisions"}],"predecessor-version":[{"id":19162,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/371\/revisions\/19162"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media\/4561"}],"wp:attachment":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}