19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 14-4:<br />

WebInspect<br />

discovered<br />

SQL<br />

injection vulnerabilities.<br />

Chapter 14: Websites and Applications<br />

When you discover SQL injection vulnerabilities, you might be inclined to<br />

stop there. That’s fine. However, I prefer to see how far I can get into the<br />

database system. An excellent — and amazingly simple — tool to use for this<br />

is SQL Injector, which comes with WebInspect. You simply provide the tool<br />

with the suspect URL that your scanner discovered, and the SQL injection<br />

process begins, as shown in Figure 14-5.<br />

You can click the Get Data or Pump Data buttons in SQL Injector to start<br />

dumping information, as shown in Figure 14-6, leading you to the ultimate<br />

ethical hacking goal.<br />

Acunetix Web Vulnerability Scanner has a similar SQL injection tool built in<br />

as well.<br />

289

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!