28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

128 Chapter 3 • Reviewing Code for <strong>SQL</strong> <strong>Injection</strong><br />

following Web application vulnerabilities: parameter manipulation, header manipulation,<br />

cookie poisoning, comm<strong>and</strong>-line parameters, <strong>SQL</strong> injections, XSS, HTTP splitting, <strong>and</strong><br />

path traversal. LAPSE is highly customizable; the configuration files shipped with the plug-in<br />

(sources.xml <strong>and</strong> sinks.xml) can be edited to augment the set of source <strong>and</strong> sink methods,<br />

respectively.<br />

■■<br />

■■<br />

■■<br />

■■<br />

■■<br />

URL: http://suif.stanford.edu/∼ livshits/work/lapse/index.html<br />

Language: Java J2EE<br />

Platforms: Windows, Linux, <strong>and</strong> OS X<br />

IDE: Eclipse<br />

Price: Free<br />

Security Compass Web<br />

Application Analysis Tool (SWAAT)<br />

You can use SWAAT to scan source code for a number of vulnerabilities, one of which is<br />

<strong>SQL</strong> injection. It uses regular expression string matching to identify potentially dangerous<br />

functions <strong>and</strong> strings in the code base, <strong>and</strong> comes with a number of preconfigured .xml files;<br />

you can add custom regular expression searches to any of the .xml files. The tool does not<br />

positively identify the existence of a vulnerability. It merely identifies the usage of functions,<br />

strings, <strong>and</strong> <strong>SQL</strong> statements that could lead to the presence of a vulnerability.<br />

■■<br />

■■<br />

■■<br />

■■<br />

URL: www.securitycompass.com/inner_swaat.shtml<br />

Languages: PHP, JSP, <strong>and</strong> ASP.NET<br />

Platforms: OS X (mono), Windows <strong>and</strong> Linux (mono)<br />

Price: Free<br />

Microsoft Source Code<br />

Analyzer for <strong>SQL</strong> <strong>Injection</strong><br />

The Microsoft Source Code Analyzer for <strong>SQL</strong> <strong>Injection</strong> tool is a static code analysis tool<br />

that you can use to find <strong>SQL</strong> injection vulnerabilities in Active Server Pages (ASP) code.<br />

The tool is for ASP classic <strong>and</strong> not .NET code. In addition, the tool underst<strong>and</strong>s only<br />

classic ASP code that is written in VBScript. It does not analyze server-side code that is<br />

written in any other languages, such as JScript.<br />

■■<br />

■■<br />

URL: http://support.microsoft.com/kb/954476<br />

Language: ASP classic (VBScript)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!