SQL injection attacks and defense
SQL injection is a technique that exploits security vulnerabilities in a web site by inserting malicious code into the database that runs it. Such attacks can be used to deface or disable public websites, spread viruses and other malware, or steal sensitive information such as credit card numbers, S...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress Pub
c2009.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627524906719 |
Tabla de Contenidos:
- Front Cover; SQL Injectgion Attacks and Defense; Copyright Page; Lead Author and Techinical Editior; Contributing Authors; Contents; Chapter 1: What Is SQL Injection?; Introduction; Understanding How Web Applications Work; A Simple Application Architecture; A More Complex Architecture; Understanding SQL Injection; High-Profile Examples; Understanding How It Happens; Dynamic String Building; Incorrectly Handled Escape Characters; Incorrectly Handled Types; Incorrectly Handled Query Assembly; Incorrectly Handled Errors; Incorrectly Handled Multiple Submissions; Insecure Database Configuration
- SummarySolutions Fast Track; Frequently Asked Questions; Chapter 2: Testing forSQL Injection; Introduction; Finding SQL Injection; Testing by Inference; Identifying Data Entry; GET Requests; POST Requests; Other Injectable Data; Manipulating Parameters; Information Workflow; Database Errors; Commonly Displayed SQL Errors; Microsoft SQL Server Errors; MySQL Errors; Oracle Errors; Application Response; Generic Errors; HTTP Code Errors; Different Response Sizes; Blind Injection Detection; Confirming SQL Injection; Differentiating Numbers and Strings; Inline SQL Injection
- Injecting Strings InlineInjecting Numeric Values Inline; Terminating SQL Injection; Database Comment Syntax; Using Comments; Executing Multiple Statements; Time Delays; Automating SQL Injection Discovery; Tools for Automatically Finding SQL Injection; HP WebInspect; IBM Rational AppScan; HP Scrawlr; SQLiX; Paros Proxy; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: Reviewing Codefor SQL Injection; Introduction; Reviewing Source Code for SQL Injection; Dangerous Coding Behaviors; Dangerous Functions; Following the Data; Following Data in PHP; Following Data in Java
- Following Data in C#Reviewing PL/SQL and T-SQL Code; Automated Source Code Review; Yet Another Source Code Analyzer (YASCA); Pixy; AppCodeScan; Lapse; Security Compass Web Application Analysis Tool (SWAAT); Microsoft Source Code Analyzer for SQL Injection; Microsoft Code Analysis Tool .NET (CAT.NET); Commercial Source Code Review Tools; Ounce; Fortify Source Code Analyzer; CodeSecure; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: ExploitingSQL Injection; Introduction; Understanding Common Exploit Techniques; Using Stacked Queries; Identifying the Database
- Non-Blind FingerprintBanner Grabbing; Blind Fingerprint; Extracting Data through UNION Statements; Matching Columns; Matching Data Types; Using Conditional Statements; Approach 1: Time-based; Approach 2: Error-based; Approach 3: Content-based; Working with Strings; Extending the Attack; Using Errors for SQL Injection; Error Messages in Oracle; Enumerating the Database Schema; SQL Server; MySQL; Oracle; Escalating Privileges; SQL Server; Privilege Escalation on Unpatched Servers; Oracle; Stealing the Password Hashes; SQL Server; MySQL; Oracle; Oracle Components; APEX; Oracle Internet Directory
- Out-of-Band Communication