28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4<br />

Exploiting<br />

<strong>SQL</strong> <strong>Injection</strong><br />

Solutions in this chapter:<br />

■■<br />

■■<br />

■■<br />

■■<br />

■■<br />

■■<br />

■■<br />

■■<br />

■■<br />

Underst<strong>and</strong>ing Common Exploit Techniques<br />

Identifying the Database<br />

Extracting Data through UNION Statements<br />

Using Conditional Statements<br />

Enumerating the Database Schema<br />

Escalating Privileges<br />

Stealing the Password Hashes<br />

Out-of-B<strong>and</strong> Communication<br />

Automating <strong>SQL</strong> <strong>Injection</strong> Exploitation<br />

˛ Summary<br />

˛ Solutions Fast Track<br />

˛ Frequently Asked Questions<br />

137

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!