28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

■■<br />

■■<br />

Platform: Windows<br />

Price: Free<br />

Microsoft Code<br />

Analysis Tool .NET (CAT.NET)<br />

Reviewing Code for <strong>SQL</strong> <strong>Injection</strong> • Chapter 3 129<br />

CAT.NET is a binary code analysis tool that helps you identify common variants of certain<br />

prevailing vulnerabilities that can give rise to common attack vectors such as XSS,<br />

<strong>SQL</strong> injection, <strong>and</strong> XPath injection. CAT.NET is a snap-in to the Visual Studio IDE that<br />

helps identify security flaws within a managed code (C#, Visual Basic .NET, J#) application.<br />

It does so by scanning the binary <strong>and</strong>/or assembly of the application, <strong>and</strong> tracing the data<br />

flow among its statements, methods, <strong>and</strong> assemblies. This includes indirect data types such as<br />

property assignments <strong>and</strong> instance tainting operations.<br />

■■<br />

■■<br />

■■<br />

■■<br />

■■<br />

URL: www.microsoft.com/downloads/details.<br />

aspx?FamilyId=0178e2ef–9da8–445e–9348–c93f 24cc9f 9d&displaylang=en<br />

Languages: C#, Visual Basic .NET, <strong>and</strong> J#<br />

Platform: Windows<br />

IDE: Visual Studio<br />

Price: Free<br />

Commercial Source Code Review Tools<br />

Commercial Source Code Analyzers (SCAs) are designed to integrate within the development<br />

life cycle of an application. Their goal is to ultimately assist the application developer in<br />

eradicating vulnerabilities in application source code as well as helping him to produce more<br />

inherently secure code. It does this by providing education <strong>and</strong> knowledge with regard to the<br />

coding mistakes that lead to the presence of security vulnerabilities, as well as empowering<br />

the developer with the tools <strong>and</strong> skills to easily adhere to secure coding practices. Each tool<br />

is marketed in its own unique way <strong>and</strong> the marketing material available for each one is<br />

extensive. The purpose of this section is not to recommend a particular product over another;<br />

it is very difficult to find good impartial comparison reviews for these products. Furthermore,<br />

it is not an easy task to find technical details on the exact approach or methodology used by<br />

each product—that is, without getting lost in public relations <strong>and</strong> sales material!<br />

The list presented is by no means extensive, but serves to introduce more advanced tool<br />

suites for readers who may require such things. I have worked with a number of clients to<br />

successfully integrate solutions that incorporated both commercial off-the-shelf (COTS) <strong>and</strong><br />

free <strong>and</strong> open source software (FOSS) source code analyzers <strong>and</strong> tool suites. The approach

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!