SQL Injection – The Old Dog of Data Security
Proposed session for SQLBits 2026TL; DR
SQL injections can be found everywhere, including your ETL frameworks, your desktop apps, even your login prompts.
In this session, we'll take a look at a wide range of code patterns that bad actors can exploit, from the obvious to the obscure, but we’ll also look at ways to prevent or mitigate the effects of SQL injection attacks.
Session Details
IT vulnerabilities leading to data breaches have been getting a lot of attention in the news, ranging from elaborate supply-chain attacks to ransomware. You may even have read about things like advanced cryptographic timing attacks or buffer overruns. But there’s one vulnerability as old as SQL itself, and it still reigns supreme when it comes to compromising your confidential information:
The SQL Injection.
This is not just about your homepage. SQL injections can be found everywhere, including your ETL frameworks, your desktop apps, even your login prompts.
I’ll show you a wide range of code patterns that bad actors can exploit, from the obvious to the obscure, but we’ll also look at ways to prevent or mitigate the effects of SQL injection attacks.
In this presentation, you will gain a firm understanding of
* the primary and secondary risk factors involved in SQL injection,
* what to look for — in your code as well as in the database itself,
* ways to detect SQL injections, and
* how to plug those vulnerabilities — whether you can change code or not.
The SQL Injection.
This is not just about your homepage. SQL injections can be found everywhere, including your ETL frameworks, your desktop apps, even your login prompts.
I’ll show you a wide range of code patterns that bad actors can exploit, from the obvious to the obscure, but we’ll also look at ways to prevent or mitigate the effects of SQL injection attacks.
In this presentation, you will gain a firm understanding of
* the primary and secondary risk factors involved in SQL injection,
* what to look for — in your code as well as in the database itself,
* ways to detect SQL injections, and
* how to plug those vulnerabilities — whether you can change code or not.
3 things you'll get out of this session
* the primary and secondary risk factors involved in SQL injection,
* what to look for — in your code as well as in the database itself,
* ways to detect SQL injections, and
* how to plug those vulnerabilities — whether you can change code or not.
Speakers
Daniel Hutmacher's other proposed sessions for 2026
20 years of productivity tips - a love letter to SSMS - 2026
Good dates, bad dates: Mastering your T-SQL date and time datatypes - 2026
JSON fundamentals for SQL pros - 2026
SQL Noire – A Database Murder Mystery - 2026
T-SQL paging done right - 2026
Daniel Hutmacher's previous sessions
ACID in SQL Server: what it is, how it works, and how to live more adventurously.
A primer on ACID compliance in SQL Server, though mostly on Isolation and Durability, since those are the ones you have some control over. Presented at Data Saturday Gothenburg and Oslo 2023.
From substitutions to public keys - an introduction to cryptography
High-level introduction to cryptography.